Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
proof of paymentt.exe

Overview

General Information

Sample name:proof of paymentt.exe
Analysis ID:1435883
MD5:1edf4ab8bd9f71ada01b5cd4763c555d
SHA1:33000bdfc8ddf75bf48f788645ecc6c028a23278
SHA256:1fbac26d1db7fce1f1ddc5c552ab50ac44888d906e355f2a9187544a52cb8c94
Tags:exeRATRemcosRAT
Infos:

Detection

Remcos, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • proof of paymentt.exe (PID: 6500 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
    • powershell.exe (PID: 2672 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4756 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5836 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • proof of paymentt.exe (PID: 6112 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
      • proof of paymentt.exe (PID: 7572 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
      • proof of paymentt.exe (PID: 7588 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
      • proof of paymentt.exe (PID: 7600 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\foaddqtciauctxnmgdeaamokiq" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
      • proof of paymentt.exe (PID: 7612 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
      • proof of paymentt.exe (PID: 7632 cmdline: "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
  • mQpdTSxCjbPop.exe (PID: 4304 cmdline: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
    • schtasks.exe (PID: 2576 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mQpdTSxCjbPop.exe (PID: 6256 cmdline: "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe" MD5: 1EDF4AB8BD9F71ADA01B5CD4763C555D)
  • chrome.exe (PID: 2272 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:/// MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5684 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2368,i,2695784621935690573,1694609991167006164,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "37.120.235.122:2269:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-F9KCYW", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.2041298477.0000000006DA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6b770:$a1: Remcos restarted by watchdog!
            • 0x6bce8:$a3: %02i:%02i:%02i:%03i
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            0.2.proof of paymentt.exe.2c69c0c.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.proof of paymentt.exe.6da0000.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.proof of paymentt.exe.2c58f94.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  9.2.mQpdTSxCjbPop.exe.2f38fa4.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.proof of paymentt.exe.6da0000.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 36 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\proof of paymentt.exe", ParentImage: C:\Users\user\Desktop\proof of paymentt.exe, ParentProcessId: 6500, ParentProcessName: proof of paymentt.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", ProcessId: 2672, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\proof of paymentt.exe", ParentImage: C:\Users\user\Desktop\proof of paymentt.exe, ParentProcessId: 6500, ParentProcessName: proof of paymentt.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", ProcessId: 2672, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe, ParentImage: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe, ParentProcessId: 4304, ParentProcessName: mQpdTSxCjbPop.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp", ProcessId: 2576, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\proof of paymentt.exe", ParentImage: C:\Users\user\Desktop\proof of paymentt.exe, ParentProcessId: 6500, ParentProcessName: proof of paymentt.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp", ProcessId: 5836, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\proof of paymentt.exe", ParentImage: C:\Users\user\Desktop\proof of paymentt.exe, ParentProcessId: 6500, ParentProcessName: proof of paymentt.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe", ProcessId: 2672, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\proof of paymentt.exe", ParentImage: C:\Users\user\Desktop\proof of paymentt.exe, ParentProcessId: 6500, ParentProcessName: proof of paymentt.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp", ProcessId: 5836, ProcessName: schtasks.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\proof of paymentt.exe, ProcessId: 6112, TargetFilename: C:\ProgramData\remcos\logs.dat
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                      Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                      Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                      Source: 0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "37.120.235.122:2269:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-F9KCYW", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeReversingLabs: Detection: 36%
                      Source: proof of paymentt.exeVirustotal: Detection: 45%Perma Link
                      Source: proof of paymentt.exeReversingLabs: Detection: 36%
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4459314039.0000000002EDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6112, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeJoe Sandbox ML: detected
                      Source: proof of paymentt.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_00433837
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,16_2_00404423
                      Source: proof of paymentt.exe, 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_2581d796-1

                      Exploits

                      barindex
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004074FD _wcslen,CoGetObject,12_2_004074FD
                      Source: proof of paymentt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49729 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 104.126.112.149:443 -> 192.168.2.5:49713 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.126.112.149:443 -> 192.168.2.5:49714 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49726 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.5:49733 version: TLS 1.2
                      Source: proof of paymentt.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_100010F1
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10006580 FindFirstFileExA,7_2_10006580
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409253
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,12_2_0041C291
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,12_2_0040C34D
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409665
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0044E879 FindFirstFileExA,12_2_0044E879
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,12_2_0040880C
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040783C FindFirstFileW,FindNextFileW,12_2_0040783C
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419AF5
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040BB30
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040BD37
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407EF8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407898
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407C97
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 4x nop then jmp 06E1B20Fh0_2_06E1B51D
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 4x nop then jmp 073BA4BFh9_2_073BA7CD

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 37.120.235.122
                      Source: global trafficTCP traffic: 192.168.2.5:49707 -> 37.120.235.122:2269
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
                      Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                      Source: Joe Sandbox ViewASN Name: SECURE-DATA-ASRO SECURE-DATA-ASRO
                      Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                      Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49729 version: TLS 1.0
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 104.126.112.149
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: unknownTCP traffic detected without corresponding DNS query: 37.120.235.122
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,12_2_0041B380
                      Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
                      Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                      Source: global trafficHTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                      Source: global trafficHTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                      Source: global trafficHTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                      Source: global trafficHTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YOPbGIHZ0rEGIjB_Qkm3crtF5Diayds78MQPvcGWLxph33UahTGVaOvK_O2C395pW0j53DoBQmglIRIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-05-03-09; NID=513=kf08ap03Enu5vH37Q9HwnjLUtxfa6l9M-obfy7WtzK2ZMJeTXigT5vVPCPaqgLe-8OzIDVElm82UrleNC9YlYfv7bkgGrz69oUBmTJ3MAv6roDxmYcpgpXDdKlv1QN9yg_UY_Y6aYr6PryPeLIu0zDCI1ApCUnSIaKK2o2tpjLQ
                      Source: global trafficHTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YOPbGIHZ0rEGIjDiV69rK5qM04HlVCP5HIxKT4yFlyXGN87fd-gxnuiXdKGTW6789z2jSG8fGE3fLfIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-05-03-09; NID=513=LlUHQLr5Y133oMGNzEa_SRif_xUDN8HY8u4HhyWXXk0hbbeVRnqkU6_cYn6XuNP9iSnwoQM46aM2DIhUrR3ksC4ODkTNTP2EulpgsMZFBF7hobj7s2cdGaRL-gaeDymBN1kscScb2mGnBHyhG5GD0ZhuJa8JFCTcQ9CmCCLOoKE
                      Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=7nm+GBGyeGaenUO&MD=Fmagl9TN HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
                      Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=7nm+GBGyeGaenUO&MD=Fmagl9TN HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: proof of paymentt.exe, 00000010.00000002.2199340161.0000000000D0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.facebook.com (Facebook)
                      Source: proof of paymentt.exe, 00000010.00000002.2199340161.0000000000D0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.yahoo.com (Yahoo)
                      Source: proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                      Source: proof of paymentt.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                      Source: proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                      Source: proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                      Source: global trafficDNS traffic detected: DNS query: www.google.com
                      Source: unknownHTTP traffic detected: POST /threshold/xls.aspx HTTP/1.1Origin: https://www.bing.comReferer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/InitAccept: */*Accept-Language: en-CHContent-type: text/xmlX-Agent-DeviceId: 01000A410900D492X-BM-CBT: 1696428841X-BM-DateFormat: dd/MM/yyyyX-BM-DeviceDimensions: 784x984X-BM-DeviceDimensionsLogical: 784x984X-BM-DeviceScale: 100X-BM-DTZ: 120X-BM-Market: CHX-BM-Theme: 000000;0078d7X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66EX-Device-ClientSession: DB0AFB19004F47BC80E5208C7478FF22X-Device-isOptin: falseX-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}X-Device-OSSKU: 48X-Device-Touch: falseX-DeviceID: 01000A410900D492X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshld77,d-thshld78,staticshX-MSEdge-ExternalExpType: JointCoordX-PositionerType: DesktopX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-Search-CortanaAvailableCapabilities: NoneX-Search-SafeSearch: ModerateX-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard TimeX-UserAgeClass: UnknownAccept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045Host: www.bing.comContent-Length: 2484Connection: Keep-AliveCache-Control: no-cacheCookie: MUID=2F4E96DB8B7049E59AD4484C3C00F7CF; _SS=SID=1A6DEABB468B65843EB5F91B47916435&CPID=1714728042053&AC=1&CPH=d1a4eb75; _EDGE_S=SID=1A6DEABB468B65843EB5F91B47916435; SRCHUID=V=2&GUID=3D32B8AC657C4AD781A584E283227995&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231004; SRCHHPGUSR=SRCHLANG=en&IPMH=986d886c&IPMID=1696428841029&HV=1696428756; CortanaAppUID=5A290E2CC4B523E2D8B5E2E3E4CB7CB7; MUIDB=2F4E96DB8B7049E59AD4484C3C00F7CF
                      Source: bhv934F.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                      Source: bhv934F.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                      Source: bhv934F.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: bhv934F.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                      Source: bhv934F.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: proof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmp, proof of paymentt.exe, 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, mQpdTSxCjbPop.exeString found in binary or memory: http://geoplugin.net/json.gp
                      Source: proof of paymentt.exe, 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, proof of paymentt.exe, 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, mQpdTSxCjbPop.exe, 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                      Source: proof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp6
                      Source: proof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpv
                      Source: proof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpx
                      Source: bhv934F.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: proof of paymentt.exe, 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, mQpdTSxCjbPop.exe, 00000009.00000002.2065439154.0000000002F79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                      Source: proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                      Source: proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                      Source: proof of paymentt.exe, 00000010.00000002.2199005782.00000000009D2000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                      Source: proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                      Source: proof of paymentt.exe, 00000010.00000002.2199340161.0000000000D0D000.00000004.00000020.00020000.00000000.sdmp, proof of paymentt.exe, 00000010.00000002.2199391458.0000000000D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                      Source: proof of paymentt.exeString found in binary or memory: https://login.yahoo.com/config/login
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                      Source: proof of paymentt.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                      Source: unknownHTTPS traffic detected: 104.126.112.149:443 -> 192.168.2.5:49713 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.126.112.149:443 -> 192.168.2.5:49714 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49726 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.5:49733 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,0000000012_2_0040A2B8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\proof of paymentt.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B70E
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004168C1
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,16_2_0040987A
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_004098E2
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,17_2_00406DFC
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,17_2_00406E9F
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,19_2_004068B5
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,19_2_004072B5
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B70E
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_0040A3E0

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4459314039.0000000002EDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6112, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041C9E2 SystemParametersInfoW,12_2_0041C9E2

                      System Summary

                      barindex
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: proof of paymentt.exe, Program.csLarge array initialization: : array initializer size 917067
                      Source: initial sampleStatic PE information: Filename: proof of paymentt.exe
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00401806 NtdllDefWindowProc_W,16_2_00401806
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_004018C0 NtdllDefWindowProc_W,16_2_004018C0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_004016FD NtdllDefWindowProc_A,17_2_004016FD
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_004017B7 NtdllDefWindowProc_A,17_2_004017B7
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00402CAC NtdllDefWindowProc_A,19_2_00402CAC
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00402D66 NtdllDefWindowProc_A,19_2_00402D66
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_004167B4
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_00D0E0540_2_00D0E054
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_02BCF1460_2_02BCF146
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_02BD00060_2_02BD0006
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_02BD00400_2_02BD0040
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E122800_2_06E12280
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E1D6600_2_06E1D660
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E165280_2_06E16528
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E152880_2_06E15288
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E173000_2_06E17300
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E173100_2_06E17310
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E14E500_2_06E14E50
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_06E169600_2_06E16960
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A70D800_2_07A70D80
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A7E6E80_2_07A7E6E8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A78EC00_2_07A78EC0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A7CD380_2_07A7CD38
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A725000_2_07A72500
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A724F00_2_07A724F0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A721680_2_07A72168
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_07A721780_2_07A72178
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_100171947_2_10017194
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_1000B5C17_2_1000B5C1
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_013EE0549_2_013EE054
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_054300409_2_05430040
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_054300069_2_05430006
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_07330D809_2_07330D80
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_0733E6E89_2_0733E6E8
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_07338EC09_2_07338EC0
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_0733CD389_2_0733CD38
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073325009_2_07332500
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073324F09_2_073324F0
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073321789_2_07332178
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073321689_2_07332168
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B22809_2_073B2280
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B4E1A9_2_073B4E1A
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B4E509_2_073B4E50
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B65289_2_073B6528
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B73109_2_073B7310
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B73009_2_073B7300
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B52889_2_073B5288
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073BC9089_2_073BC908
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B69609_2_073B6960
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043E0CC12_2_0043E0CC
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041F0FA12_2_0041F0FA
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0045415912_2_00454159
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043816812_2_00438168
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004461F012_2_004461F0
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043E2FB12_2_0043E2FB
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0045332B12_2_0045332B
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0042739D12_2_0042739D
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004374E612_2_004374E6
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043E55812_2_0043E558
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043877012_2_00438770
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004378FE12_2_004378FE
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043394612_2_00433946
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0044D9C912_2_0044D9C9
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00427A4612_2_00427A46
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041DB6212_2_0041DB62
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00427BAF12_2_00427BAF
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00437D3312_2_00437D33
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00435E5E12_2_00435E5E
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00426E0E12_2_00426E0E
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043DE9D12_2_0043DE9D
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00413FCA12_2_00413FCA
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00436FEA12_2_00436FEA
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044B04016_2_0044B040
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0043610D16_2_0043610D
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044731016_2_00447310
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044A49016_2_0044A490
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040755A16_2_0040755A
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0043C56016_2_0043C560
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044B61016_2_0044B610
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044D6C016_2_0044D6C0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_004476F016_2_004476F0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044B87016_2_0044B870
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044081D16_2_0044081D
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0041495716_2_00414957
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_004079EE16_2_004079EE
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00407AEB16_2_00407AEB
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044AA8016_2_0044AA80
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00412AA916_2_00412AA9
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00404B7416_2_00404B74
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00404B0316_2_00404B03
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044BBD816_2_0044BBD8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00404BE516_2_00404BE5
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00404C7616_2_00404C76
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00415CFE16_2_00415CFE
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00416D7216_2_00416D72
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00446D3016_2_00446D30
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00446D8B16_2_00446D8B
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00406E8F16_2_00406E8F
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0040503817_2_00405038
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0041208C17_2_0041208C
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_004050A917_2_004050A9
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0040511A17_2_0040511A
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0043C13A17_2_0043C13A
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_004051AB17_2_004051AB
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044930017_2_00449300
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0040D32217_2_0040D322
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044A4F017_2_0044A4F0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0043A5AB17_2_0043A5AB
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0041363117_2_00413631
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044669017_2_00446690
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044A73017_2_0044A730
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_004398D817_2_004398D8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_004498E017_2_004498E0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044A88617_2_0044A886
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0043DA0917_2_0043DA09
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00438D5E17_2_00438D5E
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00449ED017_2_00449ED0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0041FE8317_2_0041FE83
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00430F5417_2_00430F54
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004050C219_2_004050C2
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004014AB19_2_004014AB
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_0040513319_2_00405133
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004051A419_2_004051A4
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_0040124619_2_00401246
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_0040CA4619_2_0040CA46
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_0040523519_2_00405235
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004032C819_2_004032C8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_0040168919_2_00401689
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00402F6019_2_00402F60
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: String function: 00434E10 appears 54 times
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: String function: 00402093 appears 50 times
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: String function: 00434770 appears 41 times
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: String function: 00401E65 appears 34 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 004169A7 appears 87 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 0044DB70 appears 41 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 004165FF appears 35 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 00422297 appears 42 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 00444B5A appears 37 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 00413025 appears 79 times
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: String function: 00416760 appears 69 times
                      Source: proof of paymentt.exe, 00000000.00000002.2040544777.00000000052D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000000.00000002.2042738474.0000000007A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000000.00000000.1999530548.0000000000670000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBuYG.exe: vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000000.00000002.2036768686.0000000000D9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs proof of paymentt.exe
                      Source: proof of paymentt.exeBinary or memory string: OriginalFileName vs proof of paymentt.exe
                      Source: proof of paymentt.exe, 00000013.00000002.2190949329.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs proof of paymentt.exe
                      Source: proof of paymentt.exeBinary or memory string: OriginalFilenameBuYG.exe: vs proof of paymentt.exe
                      Source: proof of paymentt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: proof of paymentt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: mQpdTSxCjbPop.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, Uy7kHJNonmXTDU7Lsr.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, Uy7kHJNonmXTDU7Lsr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, Uy7kHJNonmXTDU7Lsr.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, SpbYAbHt8iLHtxx4fS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: proof of paymentt.exe, 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .Sln\
                      Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@41/25@3/7
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,16_2_004182CE
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_00417952
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,19_2_00410DE1
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,16_2_00418758
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040F474
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041B4A8
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AA4A
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile created: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4408:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMutant created: \Sessions\1\BaseNamedObjects\hVYNXCOwW
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-F9KCYW
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2612:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2836:120:WilError_03
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile created: C:\Users\user\AppData\Local\Temp\tmp73D0.tmpJump to behavior
                      Source: proof of paymentt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: proof of paymentt.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSystem information queried: HandleInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000011.00000002.2190655844.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: proof of paymentt.exe, 00000010.00000002.2199391458.0000000000D98000.00000004.00000020.00020000.00000000.sdmp, chp964E.tmp.16.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: proof of paymentt.exe, proof of paymentt.exe, 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: proof of paymentt.exeVirustotal: Detection: 45%
                      Source: proof of paymentt.exeReversingLabs: Detection: 36%
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile read: C:\Users\user\Desktop\proof of paymentt.exeJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                      Source: unknownProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess created: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"
                      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2368,i,2695784621935690573,1694609991167006164,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\foaddqtciauctxnmgdeaamokiq"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\foaddqtciauctxnmgdeaamokiq"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess created: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"Jump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2368,i,2695784621935690573,1694609991167006164,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: pstorec.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: pstorec.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\Desktop\proof of paymentt.cfgJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: proof of paymentt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: proof of paymentt.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: proof of paymentt.exe, Form1.cs.Net Code: LateBinding.LateCall((object)methodInfo, (Type)null, "Invoke", new object[2]{0,new string[3]{BN[0],BN[1],"VPBiblioteka"}}, (string[])null, (bool[])null)
                      Source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, Uy7kHJNonmXTDU7Lsr.cs.Net Code: I50Ltwc2At System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CB50
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_02BCEE5E push cs; ret 0_2_02BCEE5F
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 0_2_02BDAC5C push ds; retf 0_2_02BDAC5F
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10002806 push ecx; ret 7_2_10002819
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_0543AC5C push ds; retf 9_2_0543AC5F
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073BB7D0 push 0000005Dh; ret 9_2_073BB7C2
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 9_2_073B8CD0 push eax; iretd 9_2_073B8CD1
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00457106 push ecx; ret 12_2_00457119
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0045B11A push esp; ret 12_2_0045B141
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0045E54D push esi; ret 12_2_0045E556
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00457A28 push eax; ret 12_2_00457A46
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00434E56 push ecx; ret 12_2_00434E69
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044693D push ecx; ret 16_2_0044694D
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044DB70 push eax; ret 16_2_0044DB84
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0044DB70 push eax; ret 16_2_0044DBAC
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00451D54 push eax; ret 16_2_00451D61
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044B090 push eax; ret 17_2_0044B0A4
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_0044B090 push eax; ret 17_2_0044B0CC
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00451D34 push eax; ret 17_2_00451D41
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00444E71 push ecx; ret 17_2_00444E81
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00414060 push eax; ret 19_2_00414074
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00414060 push eax; ret 19_2_0041409C
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00414039 push ecx; ret 19_2_00414049
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_004164EB push 0000006Ah; retf 19_2_004165C4
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00416553 push 0000006Ah; retf 19_2_004165C4
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00416555 push 0000006Ah; retf 19_2_004165C4
                      Source: proof of paymentt.exeStatic PE information: section name: .text entropy: 7.974353343649891
                      Source: mQpdTSxCjbPop.exe.0.drStatic PE information: section name: .text entropy: 7.974353343649891
                      Source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, qcPsqkMi3y4den5Oyy.csHigh entropy of concatenated method names: 'cTLtu93Lt', 'RWXCEQRkn', 'gnxYkeVkT', 'nB51puwO9', 'kRNk3fJUH', 'fBQ3E5Pms', 'SnKC2jBH144y1VjTcA', 'JfLhnJSkJFaevoh8sj', 'KqZwHCxrp', 'EVhriHJLY'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, SpbYAbHt8iLHtxx4fS.csHigh entropy of concatenated method names: 'pDMAhHpMal', 'm5tAPMgG94', 'K6FA9QcCL1', 'y1rAoyUU6T', 'dOEA6ODpDy', 'Q94AOR3dNl', 'pXYAmDTkdI', 'KR7AnbPjcv', 'BECAGVbUEr', 'reJAbmGSWo'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, I9hepiCTEjJEHmPIqM.csHigh entropy of concatenated method names: 'hAvInUsejT', 'maIIbQvAH6', 'vTCwBXdX5r', 'lRywHMwQPw', 'wYtIEvTIOM', 'MbPIT319kZ', 'Pp4IKN77SB', 'yj8IhoPYNI', 'JELIPRvLXr', 'ltsI9faV5q'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, eMt1eXX2rWx3oOKnj4u.csHigh entropy of concatenated method names: 'RVn74e8IGC', 'YZw7uQbyrG', 'jey7tnMiS7', 'WHl7CGEJ4y', 'sc57QxDFYU', 'Kcu7Yf3EXB', 'KnW712Ch5r', 'Yog7gO2yJY', 'Rb97kCcpc8', 'Usb730oH2j'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, Gvxd3tmk2Tw2D2crrR.csHigh entropy of concatenated method names: 'hnnidymOt8', 'mTeiAe8J5r', 'LT1icYYhIl', 'NfFiyBOekH', 'peYi8C0Mor', 'qlZc6X3rb5', 'uELcOXpsEp', 'HVMcmsST2q', 'mJScn1aUoO', 'fdPcGQd9tO'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, PPKomfYuG5NaNfHBoC.csHigh entropy of concatenated method names: 'LB67H311eK', 'U217lBCmHl', 'gTe7Ln3lU8', 'bfq7e0nIES', 'fFs7A87ik9', 'ynL7cWUcXm', 'KVd7iLc83a', 'ixLwma0Uvt', 'q63wnooBpM', 'Xw1wGOOZM8'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, fYHich47ZylKAtqmou.csHigh entropy of concatenated method names: 'Dispose', 'qvrHGl7LGX', 'BnOSF5DBOu', 'Aqa55N4ou2', 'LJaHbRDhsl', 'DJvHz008Gm', 'ProcessDialogKey', 'rrBSB2b28G', 'Ea8SHV53nM', 'BCGSSNtlEp'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, iey45ceLgDGiYqC2Rr.csHigh entropy of concatenated method names: 'JWpyeqhEK5', 'sR1yDc5NNe', 'tolyiaPB86', 'ELvib3tnw5', 'jMuiz8J1LO', 'aJgyB6OxuI', 'iaIyHKroOc', 'fauySPWajL', 'ksXylGODkM', 'fHJyLkv57p'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, rgwHvasinuixl4dKg7.csHigh entropy of concatenated method names: 'tthwMZowAa', 'RKRwFXlqem', 'NnRwWdc1tb', 'XF7w2ZMNk1', 'v5iwhX4fEC', 'lJQwqvKd0I', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, w5mbb6xP21y2LOUUcn.csHigh entropy of concatenated method names: 'wnfweDy3cM', 'UhnwAqMxdJ', 'dS8wDsEb8A', 'kaAwcUjg7k', 'jAPwiSctG2', 'O3mwyMZ4Hg', 'qe6w8O2Bwt', 'uHowRJOy3k', 'zHZwsARhwZ', 'hfLwjsa8Bm'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, WTJTMbzUtcldoX9Fr5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'cnL7v7oFlB', 'AJC70ONwdS', 'kXe7xWWiyG', 'vJ17IP5gCo', 'cHT7w8kxc2', 'qAk770kXvN', 'l6N7rJmuLg'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, MmcwaCfEgbRARrJpSJ.csHigh entropy of concatenated method names: 'CFJHyUD70d', 'yBQH8Pquc2', 'fR4HsEIfC5', 'JmbHjMRcvh', 'VuDH0oBBSe', 'L8jHx0nwZZ', 'r4CgSBiyYud1GYUj1i', 'YpAeJuD0QrBmEogyJT', 'FbMHHaufZT', 'CoqHl8SjqK'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, fTBna9KfXEIggkCI7I.csHigh entropy of concatenated method names: 'zA4DClT75C', 'wqfDYcSNqT', 'zKbDgOOF4g', 'q2PDkBBwma', 'OlPD0YxaAQ', 'HhNDxgdXGj', 'lhQDISYyYE', 'RUnDwpZZpo', 'JmaD73FM9b', 'EYyDr1kGha'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, pTiHaXOv3t0tqwJkYa.csHigh entropy of concatenated method names: 'zWrvgFuBN2', 'llAvkkA52J', 'oEHvMdcjUS', 'GdavF20AW7', 'IO0v2q28Mn', 'NNOvqpio0W', 'flMvUoHxS9', 'ClKvVvlrNX', 'OoYvfBdrdF', 'rb8vE5E6dp'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, JlxJOqXj4f0swi1N0UE.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eV5rh3kl06', 'ztvrPIX9jT', 'TJAr9x0kn6', 'lf6rofmoMd', 'yBur6D2FuX', 'r9hrOSGOJG', 'ruxrmZa7Cy'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, JHJAmjlrah4ZaISbZy.csHigh entropy of concatenated method names: 'B9Fy40WnLW', 'YGNyugkGhH', 'vN3yt5wB3t', 'cFZyCKrDh6', 'WGLyQdTs6f', 'YC3yYO0ySC', 'rEfy1ZTYYN', 'fw1ygdl0Zo', 'JOwykj8tLC', 'om8y3y23Ho'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, Uy7kHJNonmXTDU7Lsr.csHigh entropy of concatenated method names: 'WR7ldW17Bu', 'wAllevXbVi', 'wtflAPHKoS', 'toZlDAZq0u', 'fpslcE7jPd', 'lGwli4wwxQ', 'XXbly6P23o', 'hB9l89ce6c', 'P6alRC5mpZ', 'DiplsZvL0P'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, r2SWyX8lgK1VOQRj9e.csHigh entropy of concatenated method names: 'Dhr0fFi4Lm', 'Lmy0TVclbj', 'wkU0hRdMPQ', 'Yx60PHR79n', 'Ttw0FB9Lbm', 'cc60WcnSCa', 'Nti0288riK', 'Uc90qCWgcg', 'UBP0ZPXrKX', 'xKE0UNoghk'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, vUJoE1Fd4ZVObjbG68.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'wqkSG82veT', 'HmLSbtMiq9', 'loqSzNOWsR', 'Jf2lBb8b39', 'E4MlHAbFsv', 'IJhlSeCHga', 'asHllujjdj', 'bLbYEAaR4iOF6KO8QMI'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, eZEvVci1QgbRrpMG4O.csHigh entropy of concatenated method names: 'nQNcQirUbP', 'I4bc1xH6S6', 'GPlDWQ5IsO', 'MKLD2DbZWy', 'G59DqiOiI7', 'LmqDZ0jiXk', 'NMRDUtxQBQ', 'mogDV8BMJI', 'gHeDNRLcNU', 'CdlDf9cPR2'
                      Source: 0.2.proof of paymentt.exe.7a80000.9.raw.unpack, i4poINBUiyLfAkGA2E.csHigh entropy of concatenated method names: 'ToString', 'P9QxEktirO', 'm9wxFLr82N', 'uNjxW60g7W', 'Wahx27Vibm', 'GVDxq8lGe6', 'HeExZMFLVC', 'wM2xUDxkyp', 'xp3xVYqy9W', 'I8cxNZIbwA'
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00406EB0 ShellExecuteW,URLDownloadToFileW,12_2_00406EB0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile created: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp"
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AA4A

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CB50
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mQpdTSxCjbPop.exe PID: 4304, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040F7A7 Sleep,ExitProcess,12_2_0040F7A7
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: D00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: 2C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: 7C40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: 8C40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: 8E00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: 9E00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 13E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 7A40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 8A40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 8BE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory allocated: 9BE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_0041A748
                      Source: C:\Users\user\Desktop\proof of paymentt.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6326Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3486Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeWindow / User API: threadDelayed 4202Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeWindow / User API: threadDelayed 5543Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeWindow / User API: foregroundWindowGot 1751Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeAPI coverage: 6.3 %
                      Source: C:\Users\user\Desktop\proof of paymentt.exeAPI coverage: 9.7 %
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 6528Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4208Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 5044Thread sleep count: 77 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 5044Thread sleep time: -38500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 5080Thread sleep count: 4202 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 5080Thread sleep time: -12606000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 5080Thread sleep count: 5543 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exe TID: 5080Thread sleep time: -16629000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe TID: 6092Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_100010F1
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10006580 FindFirstFileExA,7_2_10006580
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409253
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,12_2_0041C291
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,12_2_0040C34D
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409665
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0044E879 FindFirstFileExA,12_2_0044E879
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,12_2_0040880C
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040783C FindFirstFileW,FindNextFileW,12_2_0040783C
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419AF5
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040BB30
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040BD37
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407EF8
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 19_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407898
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407C97
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_00418981 memset,GetSystemInfo,16_2_00418981
                      Source: C:\Users\user\Desktop\proof of paymentt.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: mQpdTSxCjbPop.exe, 00000009.00000002.2071300300.000000000A420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}.
                      Source: proof of paymentt.exe, 00000007.00000002.4458837549.000000000133C000.00000004.00000020.00020000.00000000.sdmp, proof of paymentt.exe, 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: mQpdTSxCjbPop.exe, 00000009.00000002.2071300300.000000000A420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: proof of paymentt.exe, 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                      Source: C:\Users\user\Desktop\proof of paymentt.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_100060E2
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CB50
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10004AB4 mov eax, dword ptr fs:[00000030h]7_2_10004AB4
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004432B5 mov eax, dword ptr fs:[00000030h]12_2_004432B5
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_1000724E GetProcessHeap,7_2_1000724E
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_100060E2
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_10002639
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_10002B1C
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_004349F9
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00434B47 SetUnhandledExceptionFilter,12_2_00434B47
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043BB22
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00434FDC
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMemory written: C:\Users\user\Desktop\proof of paymentt.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMemory written: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: NULL target: C:\Users\user\Desktop\proof of paymentt.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: NULL target: C:\Users\user\Desktop\proof of paymentt.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeSection loaded: NULL target: C:\Users\user\Desktop\proof of paymentt.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe12_2_004120F7
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00419627 mouse_event,12_2_00419627
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\foaddqtciauctxnmgdeaamokiq"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"Jump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeProcess created: C:\Users\user\Desktop\proof of paymentt.exe "C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeProcess created: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"Jump to behavior
                      Source: proof of paymentt.exe, 00000007.00000002.4458987342.000000000134B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerYW\
                      Source: proof of paymentt.exe, 00000007.00000002.4458837549.000000000133C000.00000004.00000020.00020000.00000000.sdmp, proof of paymentt.exe, 00000007.00000002.4458987342.000000000134B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: proof of paymentt.exe, 00000007.00000002.4458837549.000000000133C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager%D
                      Source: proof of paymentt.exe, 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerB
                      Source: proof of paymentt.exe, 00000007.00000002.4458987342.000000000134B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageres }
                      Source: proof of paymentt.exe, 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerChrome
                      Source: proof of paymentt.exe, 00000007.00000002.4458837549.000000000133C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D
                      Source: proof of paymentt.exe, 00000007.00000002.4458987342.000000000134B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerYW\42]
                      Source: proof of paymentt.exe, 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, proof of paymentt.exe, 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                      Source: proof of paymentt.exe, 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, logs.dat.7.drBinary or memory string: [Program Manager]
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10002933 cpuid 7_2_10002933
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: EnumSystemLocalesW,12_2_00452036
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_004520C3
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetLocaleInfoW,12_2_00452313
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: EnumSystemLocalesW,12_2_00448404
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_0045243C
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetLocaleInfoW,12_2_00452543
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_00452610
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetLocaleInfoA,12_2_0040F8D1
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: GetLocaleInfoW,12_2_004488ED
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00451CD8
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: EnumSystemLocalesW,12_2_00451F50
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: EnumSystemLocalesW,12_2_00451F9B
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\Users\user\Desktop\proof of paymentt.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeQueries volume information: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 7_2_10002264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_10002264
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_0041B60D GetUserNameW,12_2_0041B60D
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: 12_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,12_2_00449190
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: 16_2_0041739B GetVersionExW,16_2_0041739B
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c69c0c.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c58f94.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f38fa4.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.6da0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f38fa4.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f49c1c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f49c1c.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f08824.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c28814.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2041298477.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2065439154.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4459314039.0000000002EDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6112, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040BA12
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040BB30
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: \key3.db12_2_0040BB30
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\Desktop\proof of paymentt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: ESMTPPassword17_2_004033F0
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword17_2_00402DB3
                      Source: C:\Users\user\Desktop\proof of paymentt.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword17_2_00402DB3
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 7588, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: C:\Users\user\Desktop\proof of paymentt.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-F9KCYWJump to behavior
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-F9KCYWJump to behavior
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c69c0c.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.6da0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c58f94.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f38fa4.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.6da0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f38fa4.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f49c1c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f49c1c.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.mQpdTSxCjbPop.exe.2f08824.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c69c0c.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c58f94.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.2c28814.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2041298477.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.2065439154.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.mQpdTSxCjbPop.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.498ecc8.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.proof of paymentt.exe.401a868.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4459314039.0000000002EDF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6500, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: proof of paymentt.exe PID: 6112, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: mQpdTSxCjbPop.exe PID: 6256, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                      Source: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exeCode function: cmd.exe12_2_0040569A
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services12
                      Archive Collected Data
                      12
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts12
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Bypass User Account Control
                      11
                      Deobfuscate/Decode Files or Information
                      211
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Access Token Manipulation
                      4
                      Obfuscated Files or Information
                      2
                      Credentials in Registry
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts2
                      Service Execution
                      1
                      Registry Run Keys / Startup Folder
                      1
                      Windows Service
                      22
                      Software Packing
                      3
                      Credentials In Files
                      3
                      File and Directory Discovery
                      Distributed Component Object Model211
                      Input Capture
                      1
                      Remote Access Software
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script222
                      Process Injection
                      1
                      DLL Side-Loading
                      LSA Secrets38
                      System Information Discovery
                      SSH3
                      Clipboard Data
                      3
                      Non-Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                      Scheduled Task/Job
                      1
                      Bypass User Account Control
                      Cached Domain Credentials131
                      Security Software Discovery
                      VNCGUI Input Capture14
                      Application Layer Protocol
                      Data Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                      Registry Run Keys / Startup Folder
                      1
                      Masquerading
                      DCSync31
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                      Virtualization/Sandbox Evasion
                      Proc Filesystem4
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Access Token Manipulation
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron222
                      Process Injection
                      Network Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435883 Sample: proof of paymentt.exe Startdate: 03/05/2024 Architecture: WINDOWS Score: 100 61 geoplugin.net 2->61 75 Found malware configuration 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 Antivirus detection for URL or domain 2->79 81 18 other signatures 2->81 8 proof of paymentt.exe 7 2->8         started        12 mQpdTSxCjbPop.exe 5 2->12         started        14 chrome.exe 9 2->14         started        signatures3 process4 dnsIp5 51 C:\Users\user\AppData\...\mQpdTSxCjbPop.exe, PE32 8->51 dropped 53 C:\Users\user\AppData\Local\...\tmp73D0.tmp, XML 8->53 dropped 93 Adds a directory exclusion to Windows Defender 8->93 95 Injects a PE file into a foreign processes 8->95 17 proof of paymentt.exe 3 16 8->17         started        22 powershell.exe 23 8->22         started        24 schtasks.exe 1 8->24         started        97 Multi AV Scanner detection for dropped file 12->97 99 Contains functionality to bypass UAC (CMSTPLUA) 12->99 101 Contains functionalty to change the wallpaper 12->101 103 5 other signatures 12->103 26 mQpdTSxCjbPop.exe 12->26         started        28 schtasks.exe 1 12->28         started        63 192.168.2.4 unknown unknown 14->63 65 192.168.2.5, 138, 2269, 443 unknown unknown 14->65 67 2 other IPs or domains 14->67 30 chrome.exe 14->30         started        file6 signatures7 process8 dnsIp9 55 37.120.235.122, 2269, 49707, 49709 SECURE-DATA-ASRO Romania 17->55 57 geoplugin.net 178.237.33.50, 49712, 80 ATOM86-ASATOM86NL Netherlands 17->57 49 C:\ProgramData\remcos\logs.dat, data 17->49 dropped 83 Detected Remcos RAT 17->83 85 Tries to harvest and steal browser information (history, passwords, etc) 17->85 87 Maps a DLL or memory area into another process 17->87 89 Installs a global keyboard hook 17->89 32 proof of paymentt.exe 17->32         started        35 proof of paymentt.exe 17->35         started        37 proof of paymentt.exe 16 17->37         started        47 2 other processes 17->47 91 Loading BitLocker PowerShell Module 22->91 39 WmiPrvSE.exe 22->39         started        41 conhost.exe 22->41         started        43 conhost.exe 24->43         started        45 conhost.exe 28->45         started        59 www.google.com 142.251.41.4, 443, 49716, 49717 GOOGLEUS United States 30->59 file10 signatures11 process12 signatures13 69 Tries to steal Instant Messenger accounts or passwords 32->69 71 Tries to steal Mail credentials (via file / registry access) 32->71 73 Tries to harvest and steal browser information (history, passwords, etc) 35->73

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      proof of paymentt.exe46%VirustotalBrowse
                      proof of paymentt.exe37%ReversingLabsByteCode-MSIL.Trojan.Zilla
                      proof of paymentt.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe37%ReversingLabsByteCode-MSIL.Trojan.Zilla
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      geoplugin.net4%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://www.imvu.comr0%URL Reputationsafe
                      http://www.imvu.comr0%URL Reputationsafe
                      http://geoplugin.net/json.gp100%URL Reputationphishing
                      http://geoplugin.net/json.gp100%URL Reputationphishing
                      http://geoplugin.net/json.gp/C100%URL Reputationphishing
                      http://www.ebuddy.com0%URL Reputationsafe
                      http://geoplugin.net/json.gp60%Avira URL Cloudsafe
                      37.120.235.1220%Avira URL Cloudsafe
                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                      http://geoplugin.net/json.gpx0%Avira URL Cloudsafe
                      http://geoplugin.net/json.gpv0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      geoplugin.net
                      178.237.33.50
                      truefalseunknown
                      www.google.com
                      142.251.41.4
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YOPbGIHZ0rEGIjDiV69rK5qM04HlVCP5HIxKT4yFlyXGN87fd-gxnuiXdKGTW6789z2jSG8fGE3fLfIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMfalse
                          high
                          https://www.google.com/async/newtab_promosfalse
                            high
                            http://geoplugin.net/json.gptrue
                            • URL Reputation: phishing
                            • URL Reputation: phishing
                            unknown
                            https://www.google.com/async/ddljson?async=ntp:2false
                              high
                              https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgwfalse
                                high
                                37.120.235.122true
                                • Avira URL Cloud: safe
                                unknown
                                https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0false
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabproof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                    high
                                    http://www.imvu.comrproof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoproof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                        high
                                        http://www.imvu.comproof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                            high
                                            http://geoplugin.net/json.gpxproof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                              high
                                              http://www.nirsoft.netproof of paymentt.exe, 00000010.00000002.2199005782.00000000009D2000.00000004.00000010.00020000.00000000.sdmpfalse
                                                high
                                                http://geoplugin.net/json.gp6proof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://geoplugin.net/json.gpvproof of paymentt.exe, 00000007.00000002.4459053674.0000000001379000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.ecosia.org/newtab/proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                                  high
                                                  http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comproof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://ac.ecosia.org/autocomplete?q=proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                                    high
                                                    https://www.google.comproof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      http://geoplugin.net/json.gp/Cproof of paymentt.exe, 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, proof of paymentt.exe, 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, mQpdTSxCjbPop.exe, 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                                                      • URL Reputation: phishing
                                                      unknown
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchproof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                                        high
                                                        https://www.google.com/accounts/serviceloginproof of paymentt.exefalse
                                                          high
                                                          https://login.yahoo.com/config/loginproof of paymentt.exefalse
                                                            high
                                                            http://www.nirsoft.net/proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameproof of paymentt.exe, 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, mQpdTSxCjbPop.exe, 00000009.00000002.2065439154.0000000002F79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=proof of paymentt.exe, 00000010.00000002.2199391458.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, chp960F.tmp.16.drfalse
                                                                  high
                                                                  http://www.ebuddy.comproof of paymentt.exe, proof of paymentt.exe, 00000013.00000002.2190949329.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  37.120.235.122
                                                                  unknownRomania
                                                                  3210SECURE-DATA-ASROtrue
                                                                  239.255.255.250
                                                                  unknownReserved
                                                                  unknownunknownfalse
                                                                  178.237.33.50
                                                                  geoplugin.netNetherlands
                                                                  8455ATOM86-ASATOM86NLfalse
                                                                  142.251.41.4
                                                                  www.google.comUnited States
                                                                  15169GOOGLEUSfalse
                                                                  IP
                                                                  192.168.2.9
                                                                  192.168.2.4
                                                                  192.168.2.5
                                                                  Joe Sandbox version:40.0.0 Tourmaline
                                                                  Analysis ID:1435883
                                                                  Start date and time:2024-05-03 11:20:06 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 11m 9s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:23
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:proof of paymentt.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@41/25@3/7
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 98%
                                                                  • Number of executed functions: 241
                                                                  • Number of non-executed functions: 261
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 142.250.80.35, 142.250.65.206, 172.253.63.84, 34.104.35.123, 199.232.214.172, 192.229.211.108, 23.33.40.24, 142.251.40.163, 199.232.210.172, 142.250.65.238
                                                                  • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, update.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  TimeTypeDescription
                                                                  11:20:52API Interceptor6200957x Sleep call for process: proof of paymentt.exe modified
                                                                  11:20:54API Interceptor10x Sleep call for process: powershell.exe modified
                                                                  11:20:55Task SchedulerRun new task: mQpdTSxCjbPop path: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                  11:20:55API Interceptor1x Sleep call for process: mQpdTSxCjbPop.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  239.255.255.250worldbank purchase order_May.exeGet hashmaliciousAgentTeslaBrowse
                                                                    transferencia_97564432567897895645645678697564542356475869076543256789.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                      Krnl.exeGet hashmaliciousXmrigBrowse
                                                                        https://url.uk.m.mimecastprotect.com/s/SyRLCGvv9Fo6MOBSKOu7F?domain=gansub.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          https://otoneuromonaco.comGet hashmaliciousUnknownBrowse
                                                                            https://monacolife.netGet hashmaliciousUnknownBrowse
                                                                              402d39e8-97e6-4502-ae51-28bca5592552STAgent.msiGet hashmaliciousUnknownBrowse
                                                                                http://proftrafficcounter.comGet hashmaliciousUnknownBrowse
                                                                                  PEDIDO-0347.exeGet hashmaliciousGuLoaderBrowse
                                                                                    https://www.evernote.com/shard/s441/sh/9f394111-5237-51d9-fd8f-795aca324088/eVYpymsSuSZzqBFEe6hbyb1VKNU7a60LxD4KNjXEJS7aEcIetyvIwRkjCAGet hashmaliciousUnknownBrowse
                                                                                      178.237.33.50586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      GVV.exeGet hashmaliciousRemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                                                      • geoplugin.net/json.gp
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      geoplugin.net586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                      • 178.237.33.50
                                                                                      INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      GVV.exeGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      ATOM86-ASATOM86NL586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                      • 178.237.33.50
                                                                                      INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      GVV.exeGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                                                      • 178.237.33.50
                                                                                      SECURE-DATA-ASROEi6JHlax9A.exeGet hashmaliciousRemcosBrowse
                                                                                      • 37.120.235.114
                                                                                      c5YXaP80M6975Ej.exeGet hashmaliciousRemcosBrowse
                                                                                      • 37.120.235.114
                                                                                      SecuriteInfo.com.Win32.Trojan.CobaltStrike.4EYNH5.5772.17622.dllGet hashmaliciousCobaltStrikeBrowse
                                                                                      • 37.120.232.43
                                                                                      ATT00001.pngGet hashmaliciousHTMLPhisherBrowse
                                                                                      • 37.120.234.46
                                                                                      8uT94eNAur.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Mars Stealer, Monster Stealer, PureLog StealerBrowse
                                                                                      • 37.120.237.196
                                                                                      rKYmlnOolQ.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                                      • 37.120.237.196
                                                                                      ry4836TEeV.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                                                                      • 37.120.237.196
                                                                                      ry4836TEeV.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                                                                      • 37.120.237.196
                                                                                      RUWXufvW4x.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Glupteba, LummaC Stealer, Mars Stealer, Monster StealerBrowse
                                                                                      • 37.120.237.196
                                                                                      file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                      • 37.120.237.196
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      1138de370e523e824bbca92d049a3777transferencia_97564432567897895645645678697564542356475869076543256789.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                      • 23.1.237.91
                                                                                      https://otoneuromonaco.comGet hashmaliciousUnknownBrowse
                                                                                      • 23.1.237.91
                                                                                      https://monacolife.netGet hashmaliciousUnknownBrowse
                                                                                      • 23.1.237.91
                                                                                      402d39e8-97e6-4502-ae51-28bca5592552STAgent.msiGet hashmaliciousUnknownBrowse
                                                                                      • 23.1.237.91
                                                                                      https://www.evernote.com/shard/s441/sh/9f394111-5237-51d9-fd8f-795aca324088/eVYpymsSuSZzqBFEe6hbyb1VKNU7a60LxD4KNjXEJS7aEcIetyvIwRkjCAGet hashmaliciousUnknownBrowse
                                                                                      • 23.1.237.91
                                                                                      SecuriteInfo.com.W32.Xpack.E.gen.Eldorado.18081.17119.exeGet hashmaliciousUnknownBrowse
                                                                                      • 23.1.237.91
                                                                                      Apostel.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 23.1.237.91
                                                                                      PO# CV-PO23002552.PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                      • 23.1.237.91
                                                                                      http://kprfamilydoctors.com.au//u0000Get hashmaliciousUnknownBrowse
                                                                                      • 23.1.237.91
                                                                                      c4RAHq3BNl.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                      • 23.1.237.91
                                                                                      28a2c9bd18a11de089ef85a160da29e4Payment Reciept.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      worldbank purchase order_May.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      transferencia_97564432567897895645645678697564542356475869076543256789.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      Krnl.exeGet hashmaliciousXmrigBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      https://otoneuromonaco.comGet hashmaliciousUnknownBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      402d39e8-97e6-4502-ae51-28bca5592552STAgent.msiGet hashmaliciousUnknownBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      http://proftrafficcounter.comGet hashmaliciousUnknownBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      PEDIDO-0347.exeGet hashmaliciousGuLoaderBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      https://www.evernote.com/shard/s441/sh/9f394111-5237-51d9-fd8f-795aca324088/eVYpymsSuSZzqBFEe6hbyb1VKNU7a60LxD4KNjXEJS7aEcIetyvIwRkjCAGet hashmaliciousUnknownBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      Pine Hearts - Setup.exeGet hashmaliciousUnknownBrowse
                                                                                      • 40.127.169.103
                                                                                      • 52.165.165.26
                                                                                      • 104.126.112.149
                                                                                      No context
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):324
                                                                                      Entropy (8bit):3.4363449365688448
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:6llOkU5YcIeeDAlOWAwfxNa/WA7DxbN2fBMMm0v:6l9Uec0WH50/WItN25MMl
                                                                                      MD5:A65650611C44CBAEFF468B13421B6918
                                                                                      SHA1:07EBE6FC7AD0D241046E6C8AE1904E0F7CF71751
                                                                                      SHA-256:A79BCDAAA5FE57D13F64E2596A5E38B975B84CB92039881C1518E48E1C1780CE
                                                                                      SHA-512:6A91FD3382F4342CD466C2C7FD7BE970775091397A43D39429D0B1247E05CF3300389A5947A31F8798BA4AC49413070051C68ABD251092F6BC1BF7F333E6D28C
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Preview:....[.2.0.2.4./.0.5./.0.3. .1.1.:.2.0.:.5.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.N.e.w. .T.a.b. .-. .G.o.o.g.l.e. .C.h.r.o.m.e.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                                                                                      Process:C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1216
                                                                                      Entropy (8bit):5.34331486778365
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                      Malicious:false
                                                                                      Reputation:high, very likely benign file
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1216
                                                                                      Entropy (8bit):5.34331486778365
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                      Malicious:false
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):965
                                                                                      Entropy (8bit):5.023626250399301
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:tkeknd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw7x:qPdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                      MD5:1D705D315B7FECE2D6C13A47EFD128A7
                                                                                      SHA1:32114D761B27C27C3686DC835AAD5E05B6B5A6F3
                                                                                      SHA-256:52729AABEA95E5F9A1C211F9C952B6827328D2AA816B8138048F1691DD638023
                                                                                      SHA-512:28CDA3717CD460797BD65CD6FD9CF79C683DB45DA67D0C1C27C3CDEAFFCEA6541CA36F63BD10C66BC36DA74B1399B9B4AA0A4F0F205C4E1A630BD6886E501148
                                                                                      Malicious:false
                                                                                      Preview:{. "geoplugin_request":"191.96.227.219",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):2232
                                                                                      Entropy (8bit):5.379736180876081
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZSUyus:tLHyIFKL3IZ2KRH9OugEs
                                                                                      MD5:72F35C292A6859CB7CFB21D40EC3D2F8
                                                                                      SHA1:96F18AB9B3CF301A61D0ABE374AB33B8EB864884
                                                                                      SHA-256:9CC6A174C97D345DA67AA1F586EAF5911BE61B92B75E0FB283BE338B45BA4325
                                                                                      SHA-512:B6DA5E7BE2F9D1AB05403801395524C1EFCB843747BF2C302BF8A5690A9197ED01B909852368F4A71D77EA2400085F629FF666869042A4D0A432836DF1DFD5B0
                                                                                      Malicious:false
                                                                                      Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):60
                                                                                      Entropy (8bit):4.038920595031593
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                      Malicious:false
                                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                      Category:dropped
                                                                                      Size (bytes):15728640
                                                                                      Entropy (8bit):0.10106922760070924
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:WSB2jpSB2jFSjlK/yw/ZweshzbOlqVqLesThEjv7veszO/Zk0P1EX:Wa6akUueqaeP6W
                                                                                      MD5:8474A17101F6B908E85D4EF5495DEF3C
                                                                                      SHA1:7B9993C39B3879C85BF4F343E907B9EBBDB8D30F
                                                                                      SHA-256:56CC6547BDF75FA8CA4AF11433A7CAE673C8D1DF0DE51DBEEB19EF3B1D844A2A
                                                                                      SHA-512:056D7FBFB21BFE87642D57275DD07DFD0DAE21D53A7CA7D748D4E89F199B3C212B4D6F5C4923BE156528556516AA8B4D44C6FC4D5287268C6AD5657FE5FEC7A0
                                                                                      Malicious:false
                                                                                      Preview:..kb... ...................':...{........................R.....)....{.......{3.h.T.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...........................................{3....................k.....{3..........................#......h.T.....................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                      Category:dropped
                                                                                      Size (bytes):106496
                                                                                      Entropy (8bit):1.136413900497188
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                                                      MD5:429F49156428FD53EB06FC82088FD324
                                                                                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                                                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                                                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):40960
                                                                                      Entropy (8bit):0.8553638852307782
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                      MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:XML 1.0 document, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1586
                                                                                      Entropy (8bit):5.110252129053435
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtvxvn:cgergYrFdOFzOzN33ODOiDdKrsuTpv
                                                                                      MD5:30DE788036594047F6866E18172FCF0E
                                                                                      SHA1:5ECD2B74984875A687ADE21A0F028B00AC3DB1E4
                                                                                      SHA-256:D94D3B3CC1E6476E6322553FB6F8F7D643B15E1820E47858CE87B7DA1A28B036
                                                                                      SHA-512:84F55B362D05C1E1E963B4DF566FF4763AA4382E0F0FCBBEE8034DDA1EB39BB9DAC07252548156F9BE116BF98A075B3AC06C114625499CEB499DB5CC92B89A45
                                                                                      Malicious:true
                                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                                                      Process:C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                      File Type:XML 1.0 document, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1586
                                                                                      Entropy (8bit):5.110252129053435
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtvxvn:cgergYrFdOFzOzN33ODOiDdKrsuTpv
                                                                                      MD5:30DE788036594047F6866E18172FCF0E
                                                                                      SHA1:5ECD2B74984875A687ADE21A0F028B00AC3DB1E4
                                                                                      SHA-256:D94D3B3CC1E6476E6322553FB6F8F7D643B15E1820E47858CE87B7DA1A28B036
                                                                                      SHA-512:84F55B362D05C1E1E963B4DF566FF4763AA4382E0F0FCBBEE8034DDA1EB39BB9DAC07252548156F9BE116BF98A075B3AC06C114625499CEB499DB5CC92B89A45
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):2
                                                                                      Entropy (8bit):1.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:Qn:Qn
                                                                                      MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                      Malicious:false
                                                                                      Preview:..
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 3 08:21:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2677
                                                                                      Entropy (8bit):3.98346562783628
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8KdGTiCpH+idAKZdA19ehwiZUklqehN5y+3:8zDW05y
                                                                                      MD5:FAAC070CF4451BD2954154A43DE6FB62
                                                                                      SHA1:87E5731AF26CEBC7C9B450A55F7DBDDAE92CD929
                                                                                      SHA-256:C8BE435E33565DC1124279909A45C3748F7A0A0B760CCBDB9329D54D2319505E
                                                                                      SHA-512:7F23A2694B2750EBDF5F832FE59BE68E002DA6568A6020D51716E223CD3C103C8C978311EA028899B214F7C09E6DD2DC0282D174B4DE8D16AB5B0AD305A5309D
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,....z..<;...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.J....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.J....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.J....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.J..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.J...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........kw.C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 3 08:21:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2679
                                                                                      Entropy (8bit):3.9946589403001798
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8rdGTiCpH+idAKZdA1weh/iZUkAQkqehk5y+2:8AD09Q35y
                                                                                      MD5:F4FFF4381D47A8B19213B4726886D01A
                                                                                      SHA1:C76498012BCE3DD4E225B293F351C4039189A800
                                                                                      SHA-256:0C32F3DCB637D92AFC4A5C287E62E1342D96570CB64C9564BA5594A70FB0BAAD
                                                                                      SHA-512:373EE86F44E51226801AC1B00BFDB2487D49551F82358557CD744660DC69B65626C36AB4DDDCD4FB566D646371951A167817C6BEB3675E8600CF191C363E157C
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,....Hs.<;...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.J....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.J....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.J....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.J..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.J...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........kw.C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2693
                                                                                      Entropy (8bit):4.0073619569547745
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8x7dGTiCsH+idAKZdA14tseh7sFiZUkmgqeh7sW5y+BX:8xwD3n45y
                                                                                      MD5:91A9F315E89BB57027061401DBD7C630
                                                                                      SHA1:1CB2B5A5FEF4CDA68D7B4327ACEF50F713767B60
                                                                                      SHA-256:80EDDC2DEAAE67E0C4E0372D16DB5EE46308890F6AD982EFBA08346234F2D1D6
                                                                                      SHA-512:05B2F15A2E24145691892C9C4D50D7066E4683B5036C3F800D4861887D45B86689DEE541B2C0054C21F16CCF33265E68C9F7B22F7EDFB6E4B12D61AB5050AF63
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.J....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.J....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.J....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.J..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........kw.C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 3 08:21:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2681
                                                                                      Entropy (8bit):3.992574352127052
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8LdGTiCpH+idAKZdA1vehDiZUkwqehA5y+R:8gDfe5y
                                                                                      MD5:3457E9D9C242B50306F306482E87ACC8
                                                                                      SHA1:E8C627B3EC0D8C6F7B8DFA2FA90C85B20BBB2D01
                                                                                      SHA-256:8EB5D5088D4D0BAB1A378602021DF703DA9A3AF433F88B4A69BFF0766DC4C725
                                                                                      SHA-512:F4F6CF5FACD80D40E5D01E83269F2ECED600831CE47F9617969129E78559EB0730E9BFAB4DFC4EEA0738AC910D046D86E2756523332C98CB1E4598BF31A42625
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,....Kj.;;...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.J....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.J....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.J....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.J..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.J...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........kw.C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 3 08:21:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2681
                                                                                      Entropy (8bit):3.985306917014091
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:87dGTiCpH+idAKZdA1hehBiZUk1W1qeh65y+C:8wDf9a5y
                                                                                      MD5:A2C9D67BA376663E691598A3F4902CDB
                                                                                      SHA1:713A8E3B6299FBE2A50F8E1AE9E18B9BF0DE720E
                                                                                      SHA-256:871FC1E4C669CE970FAB4ABEE06F72D6A0932DA2D635A17FE4690C5C04DF076B
                                                                                      SHA-512:A7166EB0DA990DC1C73E89EDFF647DA965B9A54E3DCDEF874F23462BB7C9FE572778AB0722DE769F948B98046D500F60D7E349B42F915A68FF8D731D5B8896EC
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,.......<;...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.J....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.J....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.J....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.J..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.J...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........kw.C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri May 3 08:21:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2683
                                                                                      Entropy (8bit):3.994848969951323
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8udGTiCpH+idAKZdA1duT+ehOuTbbiZUk5OjqehOuTb45y+yT+:8XDXT/TbxWOvTb45y7T
                                                                                      MD5:6374B21153262A592B84AB2EA67E84CD
                                                                                      SHA1:3AC364DB7968FB4F05D9683E5E8A79AC23F01F3E
                                                                                      SHA-256:97D5F86542E37522AFC067C7428AAA32FA9EF83A115C122FAECCCF2A3288C25A
                                                                                      SHA-512:8206036098D9E2F315A6ABA9308F7BF6D5D3DBD034D2D4387990D7A01713403F68E857970C4BF3F904407A550A206B5816189F6521F5590ED87DDAEE38961833
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,....0..;;...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I.X.J....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.J....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.J....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.J..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.J...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........kw.C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):976896
                                                                                      Entropy (8bit):7.967327604609445
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:twmCJ4qDVpHWXj1qmmpTjabFQx4jKkihiLvEbWnhX0R1EPyOFXqva:U+qbWXhqmsIy4xihGvEbmRaOs
                                                                                      MD5:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      SHA1:33000BDFC8DDF75BF48F788645ECC6C028A23278
                                                                                      SHA-256:1FBAC26D1DB7FCE1F1DDC5C552AB50AC44888D906E355F2A9187544A52CB8C94
                                                                                      SHA-512:1387ACFA96390165B514CFC4A32F09EE7DB6F6FB197264E0BE5695FA28ABB6DDCB1B4191F6B886058F632A92F9E8E2D817AFF447B03842CE74F64F2144DE9117
                                                                                      Malicious:true
                                                                                      Antivirus:
                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                      • Antivirus: ReversingLabs, Detection: 37%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....x4f....................."........... ........@.. .......................@............@.................................P...K........ ................... ....................................................... ............... ..H............text........ ...................... ..`.rsrc.... ....... ..................@..@.reloc....... ......................@..B........................H..........`C......0....................................................0..A....... .........%.K...(.....L... z........%.A...(.....B...(>...*.....&*.....r...p}......}.....(......+..(......(.....*.0.............E....<.........................{.....o......{.....o......+...{.....o......{.....o......+...{.....o.....~B... s...~B... s....~B..../.X ...._.*.0..........~L..........E................*.........(......{.....o.....r...p...... ....Y..+..{....s.....+.+......E....,...^...+..
                                                                                      Process:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):26
                                                                                      Entropy (8bit):3.95006375643621
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ggPYV:rPYV
                                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                      Malicious:false
                                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (714)
                                                                                      Category:downloaded
                                                                                      Size (bytes):719
                                                                                      Entropy (8bit):5.107215389196107
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:ukHK8kjm3JBBHslriFTAYsSw7sZAnIIIIIII5wuC/wuGeHHHHHYZw4/ffffffo:FVUm3JBBHslgT9lCuABuH7eHHHHHYqm4
                                                                                      MD5:D6D9B272436965C0095831E9B6DAFC1A
                                                                                      SHA1:0A5D9E5142A6AA727911CAA8D6036535FDC0C793
                                                                                      SHA-256:130BE6080CCCD2FF7568390AFBCD52AE8BEB25B580F7C11A42DA7F8CB09C50DB
                                                                                      SHA-512:0E12B495EC12B1109772CC983FA862FE90B39A9A95350A909653CE13E778FF3A75545798434291866DC0978F4884E6766BBFF3157FE346EAAFD030C94BF3252A
                                                                                      Malicious:false
                                                                                      URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                                                      Preview:)]}'.["",["concert week $25 tickets","apple iphone","bj west denver broncos","quordle hints today","tornadoes","randy travis new song","gta 6 release date","borealis trains"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002}],"google:suggestrelevance":[1250,806,805,804,803,802,801,800],"google:suggestsubtypes":[[3,143,362],[3,143,362,10],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362]],"google:suggesttype":["QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY"]}]
                                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Entropy (8bit):7.967327604609445
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                      File name:proof of paymentt.exe
                                                                                      File size:976'896 bytes
                                                                                      MD5:1edf4ab8bd9f71ada01b5cd4763c555d
                                                                                      SHA1:33000bdfc8ddf75bf48f788645ecc6c028a23278
                                                                                      SHA256:1fbac26d1db7fce1f1ddc5c552ab50ac44888d906e355f2a9187544a52cb8c94
                                                                                      SHA512:1387acfa96390165b514cfc4a32f09ee7db6f6fb197264e0be5695fa28abb6ddcb1b4191f6b886058f632a92f9e8e2d817aff447b03842ce74f64f2144de9117
                                                                                      SSDEEP:24576:twmCJ4qDVpHWXj1qmmpTjabFQx4jKkihiLvEbWnhX0R1EPyOFXqva:U+qbWXhqmsIy4xihGvEbmRaOs
                                                                                      TLSH:EB25230BF56AFF64E92413B445A5888D53B8D4119231F7635EC624C33F53BA826DEB23
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....x4f....................."........... ........@.. .......................@............@................................
                                                                                      Icon Hash:7468496969c9c826
                                                                                      Entrypoint:0x4ee29e
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x663478DD [Fri May 3 05:40:45 2024 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:4
                                                                                      OS Version Minor:0
                                                                                      File Version Major:4
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:4
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                      Instruction
                                                                                      jmp dword ptr [00402000h]
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xee2500x4b.text
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf00000x2000.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x20000xec2a40xec40081d7efde79c48ab4e28659e90726b591False0.9738363921957672data7.974353343649891IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0xf00000x20000x200035733e03744ed876f9cd87a029fa0b24False0.7213134765625data6.6490830208730465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0xf20000xc0x2000167045f9c820dd4179c453a5dc1a843False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      RT_ICON0xf00c80x1760PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9102606951871658
                                                                                      RT_GROUP_ICON0xf18380x14data1.05
                                                                                      RT_VERSION0xf185c0x31cdata0.4371859296482412
                                                                                      DLLImport
                                                                                      mscoree.dll_CorExeMain
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      May 3, 2024 11:20:51.983205080 CEST49675443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:20:51.983207941 CEST49674443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:20:52.108239889 CEST49673443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:20:54.784171104 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:55.159523010 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:55.159687996 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:55.166419983 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:55.645536900 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:55.686326027 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:56.085825920 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:56.092698097 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:56.447470903 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:56.447534084 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:56.828026056 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:56.999524117 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:57.001786947 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.415896893 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:57.418453932 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.422904015 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.455219984 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.467566967 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.606463909 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:20:57.749562979 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:57.749586105 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:57.749680996 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.749681950 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.753283978 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.755893946 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.774224043 CEST8049712178.237.33.50192.168.2.5
                                                                                      May 3, 2024 11:20:57.774343014 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:20:57.774470091 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:20:57.791460991 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:57.791832924 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.795013905 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:57.935240984 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:57.935267925 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:57.935549974 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:57.937442064 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:57.937455893 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:57.945354939 CEST8049712178.237.33.50192.168.2.5
                                                                                      May 3, 2024 11:20:57.945486069 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:20:57.955791950 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.099554062 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.099611998 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.128146887 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.128302097 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.131016970 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.131026030 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.131278992 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.144706964 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.155055046 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.155180931 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.170727015 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.173110962 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.186393976 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.220120907 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.299108028 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.299242020 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.299309015 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.299309015 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.299475908 CEST49713443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.299496889 CEST44349713104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.339379072 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.356833935 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.356869936 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.357213974 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.357362032 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.357376099 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.540230989 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.540292025 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.541430950 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.541440010 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.541673899 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.542731047 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.584124088 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.753962040 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.753982067 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.758249044 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.758390903 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.758636951 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.758714914 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.759043932 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.763031960 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.764671087 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.764688015 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.764708996 CEST49714443192.168.2.5104.126.112.149
                                                                                      May 3, 2024 11:20:58.764715910 CEST44349714104.126.112.149192.168.2.5
                                                                                      May 3, 2024 11:20:58.776789904 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:58.781037092 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.787092924 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:58.947244883 CEST8049712178.237.33.50192.168.2.5
                                                                                      May 3, 2024 11:20:58.947315931 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:20:59.436325073 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.451944113 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.483196974 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.506834984 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.506855965 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.506870031 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.506896019 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.506938934 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.510524035 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.510557890 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.510570049 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.510915041 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.510951996 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.550257921 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.550317049 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.559119940 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.559175014 CEST497102269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.866817951 CEST22694971037.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.867640018 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.907984972 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.911046982 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.911107063 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.912014961 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.912034035 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.912097931 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.921003103 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.921021938 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.921036959 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.921127081 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.921247005 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.921288967 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.921513081 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.922472954 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.922547102 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.922585964 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.922600985 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.922626019 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.922652006 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.922738075 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.925683975 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:20:59.925762892 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:20:59.925796986 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.278817892 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.278841019 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.278858900 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.278901100 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.278966904 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.287146091 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.289213896 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.289268970 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.290016890 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.292077065 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.292118073 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.292902946 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.293970108 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.294207096 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.295008898 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.296998978 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.297070026 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.297096014 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.297108889 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.299774885 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.300997972 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.301053047 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.302854061 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.305737972 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.305779934 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.305836916 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.305836916 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.305876970 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.305896044 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.305911064 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.305947065 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.305991888 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.306593895 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.310164928 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.312942982 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.312992096 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.313857079 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.315757990 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.315887928 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.315968037 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.316975117 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.318746090 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.318795919 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.319832087 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.321999073 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.322010994 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.322123051 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.322256088 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.795730114 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:00.968121052 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:00.970428944 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.204158068 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.219933987 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.228347063 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.228503942 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.228830099 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.229547977 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.230412960 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.230474949 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.231488943 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.231522083 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.231537104 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.232515097 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.233628035 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.233675003 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.234750986 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.234765053 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.234800100 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.235755920 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.236520052 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.243650913 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.243664980 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.243678093 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.243726015 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.243752003 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.244551897 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.244565964 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.244606018 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.592552900 CEST49675443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:01.592556000 CEST49674443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:01.717596054 CEST49673443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:01.977353096 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.977384090 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.977395058 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.977924109 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.977977991 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:01.999258041 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.999279022 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:01.999320030 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.000930071 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.001015902 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.001044035 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.001066923 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.001091003 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.001104116 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.001126051 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.001128912 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.001166105 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.001914978 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.007457972 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.007509947 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.008877993 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.008919954 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.011950970 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.011995077 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.012900114 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.012938976 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.012945890 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.012958050 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.012980938 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.012989044 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.013001919 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.013001919 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.013025045 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.013030052 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.013041019 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.013055086 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.013063908 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.013089895 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.060512066 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.060621023 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.334347963 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.942120075 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.942198992 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.958153009 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.958218098 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.958400011 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.958444118 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.958458900 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.958496094 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.959904909 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.959954023 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.959964037 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.960004091 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.960905075 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.960946083 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.963180065 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.963221073 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.964133024 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.964174986 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.965857983 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.965902090 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.966929913 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.966970921 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.968091011 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.968146086 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.971939087 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.971991062 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.972914934 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.972960949 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.974946976 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.974997997 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.976922989 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.976974010 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.979018927 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.979063988 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.982249975 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.982297897 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.983815908 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.983863115 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.984879017 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.984920979 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.986829996 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.986875057 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.998116016 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.998164892 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.998188972 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.998239994 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.998245955 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.998289108 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:02.999747992 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:02.999783993 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.076342106 CEST4434970323.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:03.076494932 CEST49703443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:03.410712004 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.410762072 CEST497112269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.506104946 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.521766901 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.751885891 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.751966953 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.760807991 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.760873079 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.760900021 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.760941982 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.763681889 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.763741970 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.765845060 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.765906096 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.767431974 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.767476082 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.768812895 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.768867016 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.769886971 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.769938946 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.775043011 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.775099039 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.778096914 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.778153896 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.780666113 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.780724049 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.782780886 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.782835007 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.784827948 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.784876108 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.787781000 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.787823915 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.793864965 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.793912888 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.796941996 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.796989918 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.798841953 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.798887968 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.801783085 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.801826954 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.803002119 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.803051949 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.803935051 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.803978920 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.805959940 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.806004047 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.808147907 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.808161974 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.808196068 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.808219910 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.809834003 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.809879065 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.811695099 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.811954975 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.811994076 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.812033892 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.812777042 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.812866926 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:03.813879967 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.816112041 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:03.816171885 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.155150890 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.303116083 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.303189039 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.484185934 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.485174894 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.485229969 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.487895966 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.489161968 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.489219904 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.489881039 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.490828037 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.490879059 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.500138998 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.500180960 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.500226021 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.504170895 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.504281044 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.504326105 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.504400015 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.504503012 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.504543066 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.506046057 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.508948088 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.509021997 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.509996891 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.513791084 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.513849974 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.514971018 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.561317921 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.618928909 CEST22694971137.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.720756054 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.759913921 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.760910988 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.760986090 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.776276112 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.776293039 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.776336908 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.776377916 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.778223038 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.778255939 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.778264046 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.778323889 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.778366089 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.778750896 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.780966997 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.781019926 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.783128023 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.784976006 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.785021067 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.786161900 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.787866116 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.787910938 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.789813995 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.790990114 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.791033030 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.792882919 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.793984890 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.794030905 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.830059052 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.840887070 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.840930939 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.854495049 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.854577065 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.854628086 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.855899096 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:04.908802032 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:04.991723061 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.181138992 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.182084084 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.182132006 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.182913065 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.229049921 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.268122911 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268157005 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.268209934 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268286943 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268310070 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.268348932 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268676996 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268716097 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.268781900 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268870115 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.268892050 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.268949986 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.269925117 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.269936085 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.270085096 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.270096064 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.270308018 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.270318031 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.270426989 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.270438910 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.303798914 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.304794073 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.304840088 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.331351042 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.332941055 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.332988977 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.334053040 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.334778070 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.334816933 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.336764097 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.337778091 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.337820053 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.338788033 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.341089010 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.341136932 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.343172073 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.344860077 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.344902992 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.346774101 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.349720955 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.349761963 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.350953102 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.351865053 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.351902962 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.360901117 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.404186010 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.450813055 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.452735901 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.453006983 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.454727888 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.462404013 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.462538004 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.462541103 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.462816000 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.462833881 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.462852955 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.463061094 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.463069916 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.463181973 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.463192940 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.463390112 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.463396072 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.463850021 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.463900089 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.464181900 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.464217901 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.464219093 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.464234114 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.464296103 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.464409113 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.464575052 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.464673042 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.465827942 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.465866089 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.465909958 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.467861891 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.467941046 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.467982054 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.468024015 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.468120098 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.468183041 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.469790936 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.469830990 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.472157955 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.472232103 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.472645044 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.472712994 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.472955942 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.473345041 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.473413944 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.473660946 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.473670959 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.474322081 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.474328041 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.474931002 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.474944115 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.475424051 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.475430012 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.482868910 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.482883930 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.482912064 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.483061075 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.483100891 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.483174086 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.484008074 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.484021902 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.484052896 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.484730005 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.484776974 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.493838072 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.493851900 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.493895054 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.494147062 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.494174957 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.494211912 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.495085955 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.495100975 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.495145082 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.497009993 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.500752926 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.500799894 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.526261091 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.526261091 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.526278019 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.526278019 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.663832903 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.667893887 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.668020964 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.671119928 CEST49718443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.671128988 CEST44349718142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.707926035 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.708017111 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.708185911 CEST44349719142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.708245039 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.708256960 CEST49719443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.724558115 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.732826948 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.732881069 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.770709038 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.770761013 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.772733927 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.772788048 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.851973057 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.854985952 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.855038881 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.877628088 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.882040024 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.882116079 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.883943081 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.885997057 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.886045933 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.887959957 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.889875889 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.889918089 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.892000914 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.892885923 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.892932892 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.893980980 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.895982981 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.896024942 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.896898031 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.898032904 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.898078918 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.906780958 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.907120943 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.907170057 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.909708023 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.961548090 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:05.971942902 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:05.986584902 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.986722946 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.986788988 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.987556934 CEST49716443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.987579107 CEST44349716142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.989860058 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.989898920 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:05.990313053 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.990565062 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:05.990578890 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:06.025615931 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.026226997 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:06.026350975 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:06.026504993 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:06.027101994 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.027240038 CEST49717443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:06.027256012 CEST44349717142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:06.029961109 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.030477047 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.046101093 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.047707081 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.049984932 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.050052881 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.050997019 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.052952051 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.053011894 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.054020882 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.054084063 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.055938959 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.059936047 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.060969114 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.061023951 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.083015919 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.083092928 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.083156109 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.084415913 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.084503889 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.084546089 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.086199999 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.086289883 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.086335897 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.086395025 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.088219881 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.088268042 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.088279009 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.088316917 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.089133978 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.090887070 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.093064070 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.093116999 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.094832897 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.096831083 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.096883059 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.098799944 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.100146055 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.100194931 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.101958036 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.102420092 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.179069042 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:06.228796005 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:06.384205103 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.386080980 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.386162996 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.406912088 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.407897949 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.407994986 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.504021883 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.506937027 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.510423899 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.577966928 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.582005978 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.582083941 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.583129883 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.584891081 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.584932089 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.585794926 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.587898970 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.587939024 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.634146929 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.634226084 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.634273052 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.634296894 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.634355068 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.634397030 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.635296106 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.635931015 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.635971069 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.644953012 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.653856039 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.653908968 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.658230066 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.711791992 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.845022917 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.866921902 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.866991997 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.868016005 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.876868963 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.876928091 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.930886984 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.932915926 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.932960987 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.935914040 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.937841892 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.937881947 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.938851118 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.941823959 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.941864014 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.943079948 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.946845055 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.946902037 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.949882984 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.952610016 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.952660084 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.964881897 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.964924097 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.964970112 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.977135897 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.979082108 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.979135990 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.982034922 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.985097885 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.985140085 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.987869024 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.997951984 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.997996092 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.998006105 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.998073101 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.998110056 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.998147011 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.999372005 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:06.999412060 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:06.999433041 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.001708031 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.001760006 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.004605055 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.007276058 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.007318974 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.008724928 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.012653112 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.012692928 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.296379089 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.296418905 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.296916962 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.296953917 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.297003031 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.297068119 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.297461033 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.297477961 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.297920942 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.298067093 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.298177004 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.333286047 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.338896036 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.338943958 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.344111919 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.363945007 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.373002052 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.373055935 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.395057917 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.395106077 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.395158052 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.395169020 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.395184040 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.395222902 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.395236015 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.395255089 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.395294905 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.483589888 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:07.552194118 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.555201054 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.555258989 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.567234039 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:07.586946011 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.589932919 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.589988947 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.614840984 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.615309000 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.615360975 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.615387917 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.622247934 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.622303009 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.667918921 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.671715975 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.671767950 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.673032999 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.674854994 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.674926043 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.676781893 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.678873062 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.678910017 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.709089994 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.709189892 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.709237099 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.709287882 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.745073080 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.745174885 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.929212093 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.929244041 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.929308891 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.936180115 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.937928915 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.937999010 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.972307920 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.972337961 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.972374916 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.972403049 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.972870111 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.972910881 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.984976053 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.986052036 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.986093998 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.986840963 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.986912012 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.986953020 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.987963915 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.992863894 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:07.992917061 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:07.993016958 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.016360044 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.016441107 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.024139881 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.026001930 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.026051044 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.027071953 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.027089119 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.027143002 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.027791977 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.029438019 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.029479027 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.038072109 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.038176060 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.038188934 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.038223982 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.038243055 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.038283110 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.039493084 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.039508104 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.039552927 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.039617062 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.042871952 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.042929888 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.043814898 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.044869900 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.044919968 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.046843052 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.048084021 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.048146963 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.380911112 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.380940914 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.381092072 CEST49722443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.381131887 CEST44349722142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.381525040 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.382520914 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.382605076 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.383037090 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.424122095 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478637934 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478684902 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478733063 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478745937 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.478775978 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478817940 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.478827000 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478837967 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.478888988 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.553673983 CEST49723443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:08.553709984 CEST44349723142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:08.718765020 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.720612049 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.720658064 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.728590965 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.734087944 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.734128952 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.734374046 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.734390020 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.734426975 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.734513998 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.734648943 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.734689951 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.737392902 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.737533092 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.737577915 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.740876913 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.742857933 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.742897034 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.743813038 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.744874001 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.744918108 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.747072935 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.750149965 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.750193119 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.751966000 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.756040096 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.756082058 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.760938883 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.762923956 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.762969971 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.767982960 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.773086071 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.773128986 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.773924112 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.784127951 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.784188032 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.784199953 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.784286976 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.784332991 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.784805059 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.811916113 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.812002897 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:08.812776089 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:08.864598036 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:10.368056059 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:10.368132114 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:11.660579920 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:11.660633087 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:11.660708904 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:11.661042929 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:11.661067963 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:11.847100973 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:11.991040945 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:11.991072893 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:11.991661072 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:11.997348070 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:11.997492075 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:12.065884113 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:12.977921963 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:12.977961063 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:12.978142023 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:12.979984999 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:12.979999065 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:13.201601028 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:13.372257948 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:13.372410059 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:13.375282049 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:13.375297070 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:13.375559092 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:13.446846962 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:13.599044085 CEST49703443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:13.599870920 CEST49703443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:13.600193977 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:13.600234985 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:13.600306034 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:13.601349115 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:13.601363897 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:13.754194975 CEST4434970323.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:13.755179882 CEST4434970323.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:13.807621002 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:13.852122068 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:13.919795036 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:13.919879913 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:14.031436920 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:14.053886890 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:14.053919077 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:14.054358959 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:14.054418087 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:14.056245089 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:14.056279898 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:14.056533098 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:14.056540012 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:14.061892986 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.061942101 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.061952114 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.061975956 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.061999083 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.062000990 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:14.062009096 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.062021017 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.062042952 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:14.062068939 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:14.062088013 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:14.062195063 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.062247038 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:14.062258959 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.062299013 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:14.062349081 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:14.291841984 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:14.292540073 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:14.292560101 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:14.292625904 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:15.760129929 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:15.765561104 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:15.765580893 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:15.765595913 CEST49726443192.168.2.552.165.165.26
                                                                                      May 3, 2024 11:21:15.765607119 CEST4434972652.165.165.26192.168.2.5
                                                                                      May 3, 2024 11:21:16.128365040 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:16.128365040 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:16.128408909 CEST4434972923.1.237.91192.168.2.5
                                                                                      May 3, 2024 11:21:16.128458023 CEST49729443192.168.2.523.1.237.91
                                                                                      May 3, 2024 11:21:16.645642996 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:16.645730972 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:16.686862946 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:16.695981026 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:16.985444069 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:16.985644102 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:17.024496078 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:17.024629116 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:17.314265013 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:17.356803894 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:17.365832090 CEST22694970937.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:17.365883112 CEST497092269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:21.838613033 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:21.838679075 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:21.838751078 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:23.823438883 CEST49724443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:21:23.823462009 CEST44349724142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:21:33.595994949 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:33.597373962 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:34.230422020 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:34.405497074 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:34.405618906 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:21:34.735174894 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:35.715923071 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:21:52.654671907 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:52.654709101 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:52.654764891 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:52.655380964 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:52.655395985 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.133564949 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.133697987 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.138133049 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.138147116 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.138389111 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.149770021 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.192121029 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.605412006 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.605437994 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.605453014 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.605506897 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.605526924 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.605573893 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.606050014 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.606090069 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.606112003 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.606118917 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.606157064 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.606163025 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.606206894 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.609723091 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.609743118 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:21:53.609755039 CEST49733443192.168.2.540.127.169.103
                                                                                      May 3, 2024 11:21:53.609761000 CEST4434973340.127.169.103192.168.2.5
                                                                                      May 3, 2024 11:22:03.759438038 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:22:03.761224031 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:22:04.121530056 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:22:09.386096001 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:09.386132956 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:09.386193991 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:09.386466026 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:09.386480093 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:09.574451923 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:09.574702978 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:09.574721098 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:09.575383902 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:09.575758934 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:09.575858116 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:09.618781090 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:19.584161997 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:19.584232092 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:19.584342003 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:21.497011900 CEST49735443192.168.2.5142.251.41.4
                                                                                      May 3, 2024 11:22:21.497056007 CEST44349735142.251.41.4192.168.2.5
                                                                                      May 3, 2024 11:22:33.871247053 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:22:33.989177942 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:22:34.026367903 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:22:34.453387976 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:22:47.494708061 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:22:47.947647095 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:22:48.947655916 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:22:50.759042978 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:22:54.353862047 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:23:01.556265116 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:23:03.898458004 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:23:03.993608952 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:23:05.000751019 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:23:05.416649103 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:23:15.962455034 CEST4971280192.168.2.5178.237.33.50
                                                                                      May 3, 2024 11:23:33.978338957 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:23:33.980441093 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:23:34.483520031 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:24:04.125427961 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:24:04.129704952 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:24:04.751363039 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:24:04.751435995 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:24:04.782149076 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:24:05.062532902 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:24:05.186567068 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:24:34.207643032 CEST22694970737.120.235.122192.168.2.5
                                                                                      May 3, 2024 11:24:34.211709023 CEST497072269192.168.2.537.120.235.122
                                                                                      May 3, 2024 11:24:34.576215029 CEST22694970737.120.235.122192.168.2.5
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      May 3, 2024 11:20:57.510768890 CEST5446353192.168.2.51.1.1.1
                                                                                      May 3, 2024 11:20:57.599694967 CEST53544631.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:05.144448996 CEST53617341.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:05.170620918 CEST6276953192.168.2.51.1.1.1
                                                                                      May 3, 2024 11:21:05.170847893 CEST5394653192.168.2.51.1.1.1
                                                                                      May 3, 2024 11:21:05.256632090 CEST53583291.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:05.258358955 CEST53627691.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:05.258511066 CEST53539461.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:05.808679104 CEST53567511.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:25.895941019 CEST53507741.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:21:44.845968962 CEST53624781.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:22:04.647579908 CEST53649061.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:22:07.632201910 CEST53652001.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:22:32.710522890 CEST53627111.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:22:34.091290951 CEST53558331.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:23:18.835131884 CEST53511561.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:24:33.270512104 CEST53531351.1.1.1192.168.2.5
                                                                                      May 3, 2024 11:24:40.979929924 CEST138138192.168.2.5192.168.2.255
                                                                                      TimestampSource IPDest IPChecksumCodeType
                                                                                      May 3, 2024 11:22:34.091370106 CEST192.168.2.51.1.1.1c222(Port unreachable)Destination Unreachable
                                                                                      May 3, 2024 11:22:35.216974974 CEST192.168.2.51.1.1.1c234(Port unreachable)Destination Unreachable
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      May 3, 2024 11:20:57.510768890 CEST192.168.2.51.1.1.10xe04dStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                      May 3, 2024 11:21:05.170620918 CEST192.168.2.51.1.1.10x966dStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                      May 3, 2024 11:21:05.170847893 CEST192.168.2.51.1.1.10x75b6Standard query (0)www.google.com65IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      May 3, 2024 11:20:57.599694967 CEST1.1.1.1192.168.2.50xe04dNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                      May 3, 2024 11:21:05.258358955 CEST1.1.1.1192.168.2.50x966dNo error (0)www.google.com142.251.41.4A (IP address)IN (0x0001)false
                                                                                      May 3, 2024 11:21:05.258511066 CEST1.1.1.1192.168.2.50x75b6No error (0)www.google.com65IN (0x0001)false
                                                                                      • fs.microsoft.com
                                                                                      • www.google.com
                                                                                      • slscr.update.microsoft.com
                                                                                      • https:
                                                                                        • www.bing.com
                                                                                      • geoplugin.net
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.549712178.237.33.50806112C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      May 3, 2024 11:20:57.774470091 CEST71OUTGET /json.gp HTTP/1.1
                                                                                      Host: geoplugin.net
                                                                                      Cache-Control: no-cache
                                                                                      May 3, 2024 11:20:57.945354939 CEST1173INHTTP/1.1 200 OK
                                                                                      date: Fri, 03 May 2024 09:20:57 GMT
                                                                                      server: Apache
                                                                                      content-length: 965
                                                                                      content-type: application/json; charset=utf-8
                                                                                      cache-control: public, max-age=300
                                                                                      access-control-allow-origin: *
                                                                                      Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                                                      Data Ascii: { "geoplugin_request":"191.96.227.219", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.549713104.126.112.149443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:20:58 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Accept: */*
                                                                                      Accept-Encoding: identity
                                                                                      User-Agent: Microsoft BITS/7.8
                                                                                      Host: fs.microsoft.com
                                                                                      2024-05-03 09:20:58 UTC467INHTTP/1.1 200 OK
                                                                                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                                                      Content-Type: application/octet-stream
                                                                                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                                                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                                                      Server: ECAcc (chd/073D)
                                                                                      X-CID: 11
                                                                                      X-Ms-ApiVersion: Distribute 1.2
                                                                                      X-Ms-Region: prod-weu-z1
                                                                                      Cache-Control: public, max-age=250970
                                                                                      Date: Fri, 03 May 2024 09:20:58 GMT
                                                                                      Connection: close
                                                                                      X-CID: 2


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.549714104.126.112.149443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:20:58 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Accept: */*
                                                                                      Accept-Encoding: identity
                                                                                      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                                                      Range: bytes=0-2147483646
                                                                                      User-Agent: Microsoft BITS/7.8
                                                                                      Host: fs.microsoft.com
                                                                                      2024-05-03 09:20:58 UTC531INHTTP/1.1 200 OK
                                                                                      Content-Type: application/octet-stream
                                                                                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                                                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                                                      ApiVersion: Distribute 1.1
                                                                                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                                                      X-Azure-Ref: 08K+nYgAAAACXC/Ywsy9UQ60qHfPpvzYzU0pDRURHRTA1MTIAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
                                                                                      Cache-Control: public, max-age=250880
                                                                                      Date: Fri, 03 May 2024 09:20:58 GMT
                                                                                      Content-Length: 55
                                                                                      Connection: close
                                                                                      X-CID: 2
                                                                                      2024-05-03 09:20:58 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                                                      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.549718142.251.41.44435684C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:05 UTC615OUTGET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1
                                                                                      Host: www.google.com
                                                                                      Connection: keep-alive
                                                                                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-05-03 09:21:05 UTC1191INHTTP/1.1 200 OK
                                                                                      Date: Fri, 03 May 2024 09:21:05 GMT
                                                                                      Pragma: no-cache
                                                                                      Expires: -1
                                                                                      Cache-Control: no-cache, must-revalidate
                                                                                      Content-Type: text/javascript; charset=UTF-8
                                                                                      Strict-Transport-Security: max-age=31536000
                                                                                      Content-Security-Policy: object-src 'none';base-uri 'self';script-src 'nonce-xGNLPucVbcHmcW-h67Yfdw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/cdt1
                                                                                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                      Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/cdt1"}]}
                                                                                      Accept-CH: Sec-CH-UA-Platform
                                                                                      Accept-CH: Sec-CH-UA-Platform-Version
                                                                                      Accept-CH: Sec-CH-UA-Full-Version
                                                                                      Accept-CH: Sec-CH-UA-Arch
                                                                                      Accept-CH: Sec-CH-UA-Model
                                                                                      Accept-CH: Sec-CH-UA-Bitness
                                                                                      Accept-CH: Sec-CH-UA-Full-Version-List
                                                                                      Accept-CH: Sec-CH-UA-WoW64
                                                                                      Permissions-Policy: unload=()
                                                                                      Content-Disposition: attachment; filename="f.txt"
                                                                                      Server: gws
                                                                                      X-XSS-Protection: 0
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                      Accept-Ranges: none
                                                                                      Vary: Accept-Encoding
                                                                                      Connection: close
                                                                                      Transfer-Encoding: chunked
                                                                                      2024-05-03 09:21:05 UTC64INData Raw: 32 63 66 0d 0a 29 5d 7d 27 0a 5b 22 22 2c 5b 22 63 6f 6e 63 65 72 74 20 77 65 65 6b 20 24 32 35 20 74 69 63 6b 65 74 73 22 2c 22 61 70 70 6c 65 20 69 70 68 6f 6e 65 22 2c 22 62 6a 20 77 65 73
                                                                                      Data Ascii: 2cf)]}'["",["concert week $25 tickets","apple iphone","bj wes
                                                                                      2024-05-03 09:21:05 UTC662INData Raw: 74 20 64 65 6e 76 65 72 20 62 72 6f 6e 63 6f 73 22 2c 22 71 75 6f 72 64 6c 65 20 68 69 6e 74 73 20 74 6f 64 61 79 22 2c 22 74 6f 72 6e 61 64 6f 65 73 22 2c 22 72 61 6e 64 79 20 74 72 61 76 69 73 20 6e 65 77 20 73 6f 6e 67 22 2c 22 67 74 61 20 36 20 72 65 6c 65 61 73 65 20 64 61 74 65 22 2c 22 62 6f 72 65 61 6c 69 73 20 74 72 61 69 6e 73 22 5d 2c 5b 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 2c 22 22 5d 2c 5b 5d 2c 7b 22 67 6f 6f 67 6c 65 3a 63 6c 69 65 6e 74 64 61 74 61 22 3a 7b 22 62 70 63 22 3a 66 61 6c 73 65 2c 22 74 6c 77 22 3a 66 61 6c 73 65 7d 2c 22 67 6f 6f 67 6c 65 3a 67 72 6f 75 70 73 69 6e 66 6f 22 3a 22 43 68 67 49 6b 6b 34 53 45 77 6f 52 56 48 4a 6c 62 6d 52 70 62 6d 63 67 63 32 56 68 63 6d 4e 6f 5a 58 4d 5c 75 30 30 33 64 22
                                                                                      Data Ascii: t denver broncos","quordle hints today","tornadoes","randy travis new song","gta 6 release date","borealis trains"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d"
                                                                                      2024-05-03 09:21:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      3192.168.2.549719142.251.41.44435684C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:05 UTC353OUTGET /async/ddljson?async=ntp:2 HTTP/1.1
                                                                                      Host: www.google.com
                                                                                      Connection: keep-alive
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      4192.168.2.549716142.251.41.44435684C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:05 UTC518OUTGET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1
                                                                                      Host: www.google.com
                                                                                      Connection: keep-alive
                                                                                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-05-03 09:21:05 UTC1331INHTTP/1.1 302 Found
                                                                                      Location: https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YOPbGIHZ0rEGIjB_Qkm3crtF5Diayds78MQPvcGWLxph33UahTGVaOvK_O2C395pW0j53DoBQmglIRIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                                                      x-hallmonitor-challenge: CgwIgdnSsQYQt8_8uwMSBL9g49s
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Strict-Transport-Security: max-age=31536000
                                                                                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                      Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                      Permissions-Policy: unload=()
                                                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                      Date: Fri, 03 May 2024 09:21:05 GMT
                                                                                      Server: gws
                                                                                      Content-Length: 458
                                                                                      X-XSS-Protection: 0
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      Set-Cookie: 1P_JAR=2024-05-03-09; expires=Sun, 02-Jun-2024 09:21:05 GMT; path=/; domain=.google.com; Secure; SameSite=none
                                                                                      Set-Cookie: NID=513=kf08ap03Enu5vH37Q9HwnjLUtxfa6l9M-obfy7WtzK2ZMJeTXigT5vVPCPaqgLe-8OzIDVElm82UrleNC9YlYfv7bkgGrz69oUBmTJ3MAv6roDxmYcpgpXDdKlv1QN9yg_UY_Y6aYr6PryPeLIu0zDCI1ApCUnSIaKK2o2tpjLQ; expires=Sat, 02-Nov-2024 09:21:05 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                      Connection: close
                                                                                      2024-05-03 09:21:05 UTC458INData Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 6f 72 72 79 2f 69 6e 64 65 78 3f 63 6f 6e 74 69 6e 75 65 3d 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 6f 67 62 25 33 46 68
                                                                                      Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fh


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      5192.168.2.549717142.251.41.44435684C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:05 UTC353OUTGET /async/newtab_promos HTTP/1.1
                                                                                      Host: www.google.com
                                                                                      Connection: keep-alive
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-05-03 09:21:06 UTC1249INHTTP/1.1 302 Found
                                                                                      Location: https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YOPbGIHZ0rEGIjDiV69rK5qM04HlVCP5HIxKT4yFlyXGN87fd-gxnuiXdKGTW6789z2jSG8fGE3fLfIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                                                      x-hallmonitor-challenge: CgwIgdnSsQYQ1ZS5zwMSBL9g49s
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                      Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                      Permissions-Policy: unload=()
                                                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                      Date: Fri, 03 May 2024 09:21:05 GMT
                                                                                      Server: gws
                                                                                      Content-Length: 417
                                                                                      X-XSS-Protection: 0
                                                                                      X-Frame-Options: SAMEORIGIN
                                                                                      Set-Cookie: 1P_JAR=2024-05-03-09; expires=Sun, 02-Jun-2024 09:21:05 GMT; path=/; domain=.google.com; Secure; SameSite=none
                                                                                      Set-Cookie: NID=513=LlUHQLr5Y133oMGNzEa_SRif_xUDN8HY8u4HhyWXXk0hbbeVRnqkU6_cYn6XuNP9iSnwoQM46aM2DIhUrR3ksC4ODkTNTP2EulpgsMZFBF7hobj7s2cdGaRL-gaeDymBN1kscScb2mGnBHyhG5GD0ZhuJa8JFCTcQ9CmCCLOoKE; expires=Sat, 02-Nov-2024 09:21:05 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                      Connection: close
                                                                                      2024-05-03 09:21:06 UTC6INData Raw: 3c 48 54 4d 4c 3e
                                                                                      Data Ascii: <HTML>
                                                                                      2024-05-03 09:21:06 UTC411INData Raw: 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 6f 72 72 79 2f 69 6e 64 65 78 3f 63 6f 6e 74 69 6e 75 65 3d 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 70 72 6f 6d 6f 73 26 61 6d 70 3b 71 3d
                                                                                      Data Ascii: <HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&amp;q=


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      6192.168.2.549722142.251.41.44435684C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:07 UTC920OUTGET /sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YOPbGIHZ0rEGIjB_Qkm3crtF5Diayds78MQPvcGWLxph33UahTGVaOvK_O2C395pW0j53DoBQmglIRIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
                                                                                      Host: www.google.com
                                                                                      Connection: keep-alive
                                                                                      X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      Cookie: 1P_JAR=2024-05-03-09; NID=513=kf08ap03Enu5vH37Q9HwnjLUtxfa6l9M-obfy7WtzK2ZMJeTXigT5vVPCPaqgLe-8OzIDVElm82UrleNC9YlYfv7bkgGrz69oUBmTJ3MAv6roDxmYcpgpXDdKlv1QN9yg_UY_Y6aYr6PryPeLIu0zDCI1ApCUnSIaKK2o2tpjLQ
                                                                                      2024-05-03 09:21:07 UTC356INHTTP/1.1 429 Too Many Requests
                                                                                      Date: Fri, 03 May 2024 09:21:07 GMT
                                                                                      Pragma: no-cache
                                                                                      Expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Content-Type: text/html
                                                                                      Server: HTTP server (unknown)
                                                                                      Content-Length: 3185
                                                                                      X-XSS-Protection: 0
                                                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                      Connection: close
                                                                                      2024-05-03 09:21:07 UTC899INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 6f 67 62 3f 68 6c 3d 65 6e 2d 55 53 26 61 6d 70 3b 61 73 79
                                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"><meta name="viewport" content="initial-scale=1"><title>https://www.google.com/async/newtab_ogb?hl=en-US&amp;asy
                                                                                      2024-05-03 09:21:07 UTC1255INData Raw: 0a 3c 73 63 72 69 70 74 3e 76 61 72 20 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b 20 3d 20 66 75 6e 63 74 69 6f 6e 28 72 65 73 70 6f 6e 73 65 29 20 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 61 70 74 63 68 61 2d 66 6f 72 6d 27 29 2e 73 75 62 6d 69 74 28 29 3b 7d 3b 3c 2f 73 63 72 69 70 74 3e 0a 3c 64 69 76 20 69 64 3d 22 72 65 63 61 70 74 63 68 61 22 20 63 6c 61 73 73 3d 22 67 2d 72 65 63 61 70 74 63 68 61 22 20 64 61 74 61 2d 73 69 74 65 6b 65 79 3d 22 36 4c 66 77 75 79 55 54 41 41 41 41 41 4f 41 6d 6f 53 30 66 64 71 69 6a 43 32 50 62 62 64 48 34 6b 6a 71 36 32 59 31 62 22 20 64 61 74 61 2d 63 61 6c 6c 62 61 63 6b 3d 22 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b 22 20 64 61 74 61 2d 73 3d 22 7a 63 68 4b 35 31 6a 4c 63
                                                                                      Data Ascii: <script>var submitCallback = function(response) {document.getElementById('captcha-form').submit();};</script><div id="recaptcha" class="g-recaptcha" data-sitekey="6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b" data-callback="submitCallback" data-s="zchK51jLc
                                                                                      2024-05-03 09:21:07 UTC1031INData Raw: 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 34 65 6d 3b 22 3e 0a 54 68 69 73 20 70 61 67 65 20 61 70 70 65 61 72 73 20 77 68 65 6e 20 47 6f 6f 67 6c 65 20 61 75 74 6f 6d 61 74 69 63 61 6c 6c 79 20 64 65 74 65 63 74 73 20 72 65 71 75 65 73 74 73 20 63 6f 6d 69 6e 67 20 66 72 6f 6d 20 79 6f 75 72 20 63 6f 6d 70 75 74 65 72 20 6e 65 74 77 6f 72 6b 20 77 68 69 63 68 20 61 70 70 65 61 72 20 74 6f 20 62 65 20 69 6e 20 76 69 6f 6c 61 74 69 6f 6e 20 6f 66 20 74 68 65 20 3c 61 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 70 6f 6c 69 63 69 65 73 2f 74 65 72 6d 73 2f 22 3e 54 65 72 6d 73 20 6f 66 20 53 65 72 76 69 63 65 3c 2f 61 3e 2e 20 54 68 65 20 62 6c 6f 63 6b 20 77 69 6c 6c 20 65 78 70 69 72 65 20 73 68 6f 72 74 6c 79 20 61 66 74
                                                                                      Data Ascii: ; line-height:1.4em;">This page appears when Google automatically detects requests coming from your computer network which appear to be in violation of the <a href="//www.google.com/policies/terms/">Terms of Service</a>. The block will expire shortly aft


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      7192.168.2.549723142.251.41.44435684C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:08 UTC738OUTGET /sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YOPbGIHZ0rEGIjDiV69rK5qM04HlVCP5HIxKT4yFlyXGN87fd-gxnuiXdKGTW6789z2jSG8fGE3fLfIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
                                                                                      Host: www.google.com
                                                                                      Connection: keep-alive
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      Cookie: 1P_JAR=2024-05-03-09; NID=513=LlUHQLr5Y133oMGNzEa_SRif_xUDN8HY8u4HhyWXXk0hbbeVRnqkU6_cYn6XuNP9iSnwoQM46aM2DIhUrR3ksC4ODkTNTP2EulpgsMZFBF7hobj7s2cdGaRL-gaeDymBN1kscScb2mGnBHyhG5GD0ZhuJa8JFCTcQ9CmCCLOoKE
                                                                                      2024-05-03 09:21:08 UTC356INHTTP/1.1 429 Too Many Requests
                                                                                      Date: Fri, 03 May 2024 09:21:08 GMT
                                                                                      Pragma: no-cache
                                                                                      Expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Content-Type: text/html
                                                                                      Server: HTTP server (unknown)
                                                                                      Content-Length: 3113
                                                                                      X-XSS-Protection: 0
                                                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                      Connection: close
                                                                                      2024-05-03 09:21:08 UTC899INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 70 72 6f 6d 6f 73 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64
                                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"><meta name="viewport" content="initial-scale=1"><title>https://www.google.com/async/newtab_promos</title></head
                                                                                      2024-05-03 09:21:08 UTC1255INData Raw: 61 63 6b 20 3d 20 66 75 6e 63 74 69 6f 6e 28 72 65 73 70 6f 6e 73 65 29 20 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 61 70 74 63 68 61 2d 66 6f 72 6d 27 29 2e 73 75 62 6d 69 74 28 29 3b 7d 3b 3c 2f 73 63 72 69 70 74 3e 0a 3c 64 69 76 20 69 64 3d 22 72 65 63 61 70 74 63 68 61 22 20 63 6c 61 73 73 3d 22 67 2d 72 65 63 61 70 74 63 68 61 22 20 64 61 74 61 2d 73 69 74 65 6b 65 79 3d 22 36 4c 66 77 75 79 55 54 41 41 41 41 41 4f 41 6d 6f 53 30 66 64 71 69 6a 43 32 50 62 62 64 48 34 6b 6a 71 36 32 59 31 62 22 20 64 61 74 61 2d 63 61 6c 6c 62 61 63 6b 3d 22 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b 22 20 64 61 74 61 2d 73 3d 22 63 5f 34 54 4e 4a 54 4f 49 39 35 4d 4d 2d 70 70 73 65 56 66 6c 41 31 59 59 79 38 55 4e 41 48 57 54
                                                                                      Data Ascii: ack = function(response) {document.getElementById('captcha-form').submit();};</script><div id="recaptcha" class="g-recaptcha" data-sitekey="6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b" data-callback="submitCallback" data-s="c_4TNJTOI95MM-ppseVflA1YYy8UNAHWT
                                                                                      2024-05-03 09:21:08 UTC959INData Raw: 6f 67 6c 65 20 61 75 74 6f 6d 61 74 69 63 61 6c 6c 79 20 64 65 74 65 63 74 73 20 72 65 71 75 65 73 74 73 20 63 6f 6d 69 6e 67 20 66 72 6f 6d 20 79 6f 75 72 20 63 6f 6d 70 75 74 65 72 20 6e 65 74 77 6f 72 6b 20 77 68 69 63 68 20 61 70 70 65 61 72 20 74 6f 20 62 65 20 69 6e 20 76 69 6f 6c 61 74 69 6f 6e 20 6f 66 20 74 68 65 20 3c 61 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 70 6f 6c 69 63 69 65 73 2f 74 65 72 6d 73 2f 22 3e 54 65 72 6d 73 20 6f 66 20 53 65 72 76 69 63 65 3c 2f 61 3e 2e 20 54 68 65 20 62 6c 6f 63 6b 20 77 69 6c 6c 20 65 78 70 69 72 65 20 73 68 6f 72 74 6c 79 20 61 66 74 65 72 20 74 68 6f 73 65 20 72 65 71 75 65 73 74 73 20 73 74 6f 70 2e 20 20 49 6e 20 74 68 65 20 6d 65 61 6e 74 69 6d 65 2c 20 73 6f 6c 76 69 6e
                                                                                      Data Ascii: ogle automatically detects requests coming from your computer network which appear to be in violation of the <a href="//www.google.com/policies/terms/">Terms of Service</a>. The block will expire shortly after those requests stop. In the meantime, solvin


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      8192.168.2.54972652.165.165.26443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:13 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=7nm+GBGyeGaenUO&MD=Fmagl9TN HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Accept: */*
                                                                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                                      Host: slscr.update.microsoft.com
                                                                                      2024-05-03 09:21:14 UTC560INHTTP/1.1 200 OK
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Content-Type: application/octet-stream
                                                                                      Expires: -1
                                                                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                                                      MS-CorrelationId: 0280f95f-067b-4e02-b15f-a0b5afcee2d1
                                                                                      MS-RequestId: f8494c29-be70-4dde-a843-4009ead05cce
                                                                                      MS-CV: FBNxucPFr0O+ItJn.0
                                                                                      X-Microsoft-SLSClientCache: 2880
                                                                                      Content-Disposition: attachment; filename=environment.cab
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Date: Fri, 03 May 2024 09:21:13 GMT
                                                                                      Connection: close
                                                                                      Content-Length: 24490
                                                                                      2024-05-03 09:21:14 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                                                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                                                      2024-05-03 09:21:14 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                                                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                                                      9192.168.2.54972923.1.237.91443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:14 UTC2148OUTPOST /threshold/xls.aspx HTTP/1.1
                                                                                      Origin: https://www.bing.com
                                                                                      Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
                                                                                      Accept: */*
                                                                                      Accept-Language: en-CH
                                                                                      Content-type: text/xml
                                                                                      X-Agent-DeviceId: 01000A410900D492
                                                                                      X-BM-CBT: 1696428841
                                                                                      X-BM-DateFormat: dd/MM/yyyy
                                                                                      X-BM-DeviceDimensions: 784x984
                                                                                      X-BM-DeviceDimensionsLogical: 784x984
                                                                                      X-BM-DeviceScale: 100
                                                                                      X-BM-DTZ: 120
                                                                                      X-BM-Market: CH
                                                                                      X-BM-Theme: 000000;0078d7
                                                                                      X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66E
                                                                                      X-Device-ClientSession: DB0AFB19004F47BC80E5208C7478FF22
                                                                                      X-Device-isOptin: false
                                                                                      X-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}
                                                                                      X-Device-OSSKU: 48
                                                                                      X-Device-Touch: false
                                                                                      X-DeviceID: 01000A410900D492
                                                                                      X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshld77,d-thshld78,staticsh
                                                                                      X-MSEdge-ExternalExpType: JointCoord
                                                                                      X-PositionerType: Desktop
                                                                                      X-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI
                                                                                      X-Search-CortanaAvailableCapabilities: None
                                                                                      X-Search-SafeSearch: Moderate
                                                                                      X-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard Time
                                                                                      X-UserAgeClass: Unknown
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045
                                                                                      Host: www.bing.com
                                                                                      Content-Length: 2484
                                                                                      Connection: Keep-Alive
                                                                                      Cache-Control: no-cache
                                                                                      Cookie: MUID=2F4E96DB8B7049E59AD4484C3C00F7CF; _SS=SID=1A6DEABB468B65843EB5F91B47916435&CPID=1714728042053&AC=1&CPH=d1a4eb75; _EDGE_S=SID=1A6DEABB468B65843EB5F91B47916435; SRCHUID=V=2&GUID=3D32B8AC657C4AD781A584E283227995&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231004; SRCHHPGUSR=SRCHLANG=en&IPMH=986d886c&IPMID=1696428841029&HV=1696428756; CortanaAppUID=5A290E2CC4B523E2D8B5E2E3E4CB7CB7; MUIDB=2F4E96DB8B7049E59AD4484C3C00F7CF
                                                                                      2024-05-03 09:21:14 UTC1OUTData Raw: 3c
                                                                                      Data Ascii: <
                                                                                      2024-05-03 09:21:14 UTC2483OUTData Raw: 43 6c 69 65 6e 74 49 6e 73 74 52 65 71 75 65 73 74 3e 3c 43 49 44 3e 33 36 34 34 46 44 37 34 44 46 31 36 36 31 38 46 30 38 46 37 45 43 30 33 44 45 35 35 36 30 30 31 3c 2f 43 49 44 3e 3c 45 76 65 6e 74 73 3e 3c 45 3e 3c 54 3e 45 76 65 6e 74 2e 43 6c 69 65 6e 74 49 6e 73 74 3c 2f 54 3e 3c 49 47 3e 37 35 32 32 38 31 35 36 37 30 33 41 34 30 44 35 42 39 37 45 35 41 36 38 33 36 46 32 41 31 43 45 3c 2f 49 47 3e 3c 44 3e 3c 21 5b 43 44 41 54 41 5b 7b 22 43 75 72 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 69 6e 67 2e 63 6f 6d 2f 41 53 2f 41 50 49 2f 57 69 6e 64 6f 77 73 43 6f 72 74 61 6e 61 50 61 6e 65 2f 56 32 2f 49 6e 69 74 22 2c 22 50 69 76 6f 74 22 3a 22 51 46 22 2c 22 54 22 3a 22 43 49 2e 42 6f 78 4d 6f 64 65 6c 22 2c 22 46 49 44 22 3a 22 43 49
                                                                                      Data Ascii: ClientInstRequest><CID>3644FD74DF16618F08F7EC03DE556001</CID><Events><E><T>Event.ClientInst</T><IG>75228156703A40D5B97E5A6836F2A1CE</IG><D><![CDATA[{"CurUrl":"https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init","Pivot":"QF","T":"CI.BoxModel","FID":"CI
                                                                                      2024-05-03 09:21:14 UTC480INHTTP/1.1 204 No Content
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                      X-MSEdge-Ref: Ref A: 7FC71A0E1F654749B63358F275FF89AD Ref B: LAX311000112029 Ref C: 2024-05-03T09:21:14Z
                                                                                      Date: Fri, 03 May 2024 09:21:14 GMT
                                                                                      Connection: close
                                                                                      Alt-Svc: h3=":443"; ma=93600
                                                                                      X-CDN-TraceID: 0.57ed0117.1714728074.109330e2


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      10192.168.2.54973340.127.169.103443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-05-03 09:21:53 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=7nm+GBGyeGaenUO&MD=Fmagl9TN HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Accept: */*
                                                                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                                      Host: slscr.update.microsoft.com
                                                                                      2024-05-03 09:21:53 UTC560INHTTP/1.1 200 OK
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Content-Type: application/octet-stream
                                                                                      Expires: -1
                                                                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                                      ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
                                                                                      MS-CorrelationId: 53321247-919f-4808-acbf-55f078fea7dd
                                                                                      MS-RequestId: d3814dff-3b3d-4447-bf6d-ee7e48f4999f
                                                                                      MS-CV: CHpn7twnSUO10R6N.0
                                                                                      X-Microsoft-SLSClientCache: 2160
                                                                                      Content-Disposition: attachment; filename=environment.cab
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Date: Fri, 03 May 2024 09:21:53 GMT
                                                                                      Connection: close
                                                                                      Content-Length: 25457
                                                                                      2024-05-03 09:21:53 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
                                                                                      Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
                                                                                      2024-05-03 09:21:53 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
                                                                                      Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:11:20:52
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe"
                                                                                      Imagebase:0x580000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2041298477.0000000006DA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2038684853.000000000498E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2037579032.0000000002C01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2038684853.0000000003F02000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:3
                                                                                      Start time:11:20:53
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"
                                                                                      Imagebase:0x1d0000
                                                                                      File size:433'152 bytes
                                                                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:4
                                                                                      Start time:11:20:53
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff6d64d0000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:5
                                                                                      Start time:11:20:53
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp73D0.tmp"
                                                                                      Imagebase:0xac0000
                                                                                      File size:187'904 bytes
                                                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:6
                                                                                      Start time:11:20:53
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff6d64d0000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:7
                                                                                      Start time:11:20:54
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe"
                                                                                      Imagebase:0xc70000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4459314039.0000000002EDF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4458667961.0000000001320000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4458472507.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Target ID:8
                                                                                      Start time:11:20:55
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                      Imagebase:0x7ff6ef0c0000
                                                                                      File size:496'640 bytes
                                                                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:9
                                                                                      Start time:11:20:55
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                      Imagebase:0xab0000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.2065439154.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Antivirus matches:
                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                      • Detection: 37%, ReversingLabs
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:10
                                                                                      Start time:11:20:56
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mQpdTSxCjbPop" /XML "C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp"
                                                                                      Imagebase:0xac0000
                                                                                      File size:187'904 bytes
                                                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:11
                                                                                      Start time:11:20:56
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff6d64d0000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:12
                                                                                      Start time:11:20:56
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe"
                                                                                      Imagebase:0x6e0000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.2044389940.0000000000D9B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:13
                                                                                      Start time:11:21:03
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
                                                                                      Imagebase:0x7ff715980000
                                                                                      File size:3'242'272 bytes
                                                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:14
                                                                                      Start time:11:21:03
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 --field-trial-handle=2368,i,2695784621935690573,1694609991167006164,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                      Imagebase:0x7ff715980000
                                                                                      File size:3'242'272 bytes
                                                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:15
                                                                                      Start time:11:21:10
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"
                                                                                      Imagebase:0xa0000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:16
                                                                                      Start time:11:21:11
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\vtvkcyiauscpqjziosjypht"
                                                                                      Imagebase:0x750000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:17
                                                                                      Start time:11:21:11
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\foaddqtciauctxnmgdeaamokiq"
                                                                                      Imagebase:0x700000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:18
                                                                                      Start time:11:21:11
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"
                                                                                      Imagebase:0x2c0000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:19
                                                                                      Start time:11:21:11
                                                                                      Start date:03/05/2024
                                                                                      Path:C:\Users\user\Desktop\proof of paymentt.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\proof of paymentt.exe" /stext "C:\Users\user\AppData\Local\Temp\qqgoejdwwimhddbqpnrbdyitqektl"
                                                                                      Imagebase:0xb30000
                                                                                      File size:976'896 bytes
                                                                                      MD5 hash:1EDF4AB8BD9F71ADA01B5CD4763C555D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:9.1%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:0%
                                                                                        Total number of Nodes:263
                                                                                        Total number of Limit Nodes:10
                                                                                        execution_graph 47310 d0d6e0 DuplicateHandle 47311 d0d776 47310->47311 47571 d047b0 47572 d047b9 47571->47572 47575 d048e8 47572->47575 47573 d047bf 47576 d0490d 47575->47576 47580 d04e00 47576->47580 47584 d04dfe 47576->47584 47577 d04917 47577->47573 47581 d04e27 47580->47581 47582 d04f04 47581->47582 47588 d0450c 47581->47588 47586 d04e27 47584->47586 47585 d04f04 47585->47585 47586->47585 47587 d0450c CreateActCtxA 47586->47587 47587->47585 47589 d05e90 CreateActCtxA 47588->47589 47591 d05f53 47589->47591 47260 2bd1ea8 47261 2bd1ece 47260->47261 47264 2bd0ad4 47261->47264 47265 2bd0adf 47264->47265 47266 2bd2c79 47265->47266 47268 2bd2c69 47265->47268 47289 2bd0bfc 47266->47289 47273 2bd2e6c 47268->47273 47279 2bd2d90 47268->47279 47284 2bd2da0 47268->47284 47269 2bd2c77 47269->47269 47274 2bd2e7a 47273->47274 47275 2bd2e2a 47273->47275 47293 2bd2e58 47275->47293 47296 2bd2e48 47275->47296 47276 2bd2e40 47276->47269 47280 2bd2d95 47279->47280 47282 2bd2e58 CallWindowProcW 47280->47282 47283 2bd2e48 CallWindowProcW 47280->47283 47281 2bd2e40 47281->47269 47282->47281 47283->47281 47285 2bd2db4 47284->47285 47287 2bd2e58 CallWindowProcW 47285->47287 47288 2bd2e48 CallWindowProcW 47285->47288 47286 2bd2e40 47286->47269 47287->47286 47288->47286 47290 2bd0c07 47289->47290 47291 2bd435a CallWindowProcW 47290->47291 47292 2bd4309 47290->47292 47291->47292 47292->47269 47294 2bd2e69 47293->47294 47299 2bd429b 47293->47299 47294->47276 47297 2bd2e69 47296->47297 47298 2bd429b CallWindowProcW 47296->47298 47297->47276 47298->47297 47300 2bd0bfc CallWindowProcW 47299->47300 47301 2bd42aa 47300->47301 47301->47294 47312 6e180d6 47317 6e1ae19 47312->47317 47338 6e1adc8 47312->47338 47359 6e1adb9 47312->47359 47313 6e180e5 47318 6e1adbc 47317->47318 47333 6e1adea 47318->47333 47380 6e1b4d0 47318->47380 47384 6e1bbd0 47318->47384 47392 6e1b5ae 47318->47392 47400 6e1b1cf 47318->47400 47404 6e1b42c 47318->47404 47409 6e1b6ab 47318->47409 47414 6e1b30b 47318->47414 47419 6e1b4ab 47318->47419 47424 6e1b529 47318->47424 47432 6e1b322 47318->47432 47437 6e1bcde 47318->47437 47441 6e1b1df 47318->47441 47445 6e1b3df 47318->47445 47450 6e1b67f 47318->47450 47458 6e1b938 47318->47458 47463 6e1b236 47318->47463 47467 6e1b477 47318->47467 47472 6e1b9d7 47318->47472 47333->47313 47339 6e1ade2 47338->47339 47340 6e1adea 47339->47340 47341 6e1b322 2 API calls 47339->47341 47342 6e1b529 4 API calls 47339->47342 47343 6e1b4ab 2 API calls 47339->47343 47344 6e1b30b 2 API calls 47339->47344 47345 6e1b6ab 2 API calls 47339->47345 47346 6e1b42c 2 API calls 47339->47346 47347 6e1b1cf 2 API calls 47339->47347 47348 6e1b5ae 4 API calls 47339->47348 47349 6e1bbd0 2 API calls 47339->47349 47350 6e1b4d0 2 API calls 47339->47350 47351 6e1b9d7 2 API calls 47339->47351 47352 6e1b477 2 API calls 47339->47352 47353 6e1b236 2 API calls 47339->47353 47354 6e1b938 2 API calls 47339->47354 47355 6e1b67f 4 API calls 47339->47355 47356 6e1b3df 2 API calls 47339->47356 47357 6e1b1df 2 API calls 47339->47357 47358 6e1bcde 2 API calls 47339->47358 47340->47313 47341->47340 47342->47340 47343->47340 47344->47340 47345->47340 47346->47340 47347->47340 47348->47340 47349->47340 47350->47340 47351->47340 47352->47340 47353->47340 47354->47340 47355->47340 47356->47340 47357->47340 47358->47340 47360 6e1adbc 47359->47360 47361 6e1adea 47360->47361 47362 6e1b322 2 API calls 47360->47362 47363 6e1b529 4 API calls 47360->47363 47364 6e1b4ab 2 API calls 47360->47364 47365 6e1b30b 2 API calls 47360->47365 47366 6e1b6ab 2 API calls 47360->47366 47367 6e1b42c 2 API calls 47360->47367 47368 6e1b1cf 2 API calls 47360->47368 47369 6e1b5ae 4 API calls 47360->47369 47370 6e1bbd0 2 API calls 47360->47370 47371 6e1b4d0 2 API calls 47360->47371 47372 6e1b9d7 2 API calls 47360->47372 47373 6e1b477 2 API calls 47360->47373 47374 6e1b236 2 API calls 47360->47374 47375 6e1b938 2 API calls 47360->47375 47376 6e1b67f 4 API calls 47360->47376 47377 6e1b3df 2 API calls 47360->47377 47378 6e1b1df 2 API calls 47360->47378 47379 6e1bcde 2 API calls 47360->47379 47361->47313 47362->47361 47363->47361 47364->47361 47365->47361 47366->47361 47367->47361 47368->47361 47369->47361 47370->47361 47371->47361 47372->47361 47373->47361 47374->47361 47375->47361 47376->47361 47377->47361 47378->47361 47379->47361 47477 6e17800 47380->47477 47481 6e17808 47380->47481 47381 6e1b2f7 47381->47333 47385 6e1bb93 47384->47385 47387 6e1b4a1 47384->47387 47390 6e17231 Wow64SetThreadContext 47385->47390 47489 6e17238 47385->47489 47386 6e1bc08 47387->47386 47389 6e17238 Wow64SetThreadContext 47387->47389 47485 6e17231 47387->47485 47389->47387 47390->47387 47393 6e1b528 47392->47393 47394 6e1b456 47393->47394 47398 6e17231 Wow64SetThreadContext 47393->47398 47399 6e17238 Wow64SetThreadContext 47393->47399 47493 6e178f0 47394->47493 47497 6e178f8 47394->47497 47395 6e1ba00 47398->47393 47399->47393 47401 6e1b1d2 47400->47401 47501 6e17a90 47401->47501 47505 6e17a84 47401->47505 47405 6e1b43e 47404->47405 47407 6e178f0 ReadProcessMemory 47405->47407 47408 6e178f8 ReadProcessMemory 47405->47408 47406 6e1ba00 47407->47406 47408->47406 47410 6e1b6b1 47409->47410 47411 6e1b888 47410->47411 47412 6e17800 WriteProcessMemory 47410->47412 47413 6e17808 WriteProcessMemory 47410->47413 47411->47333 47412->47410 47413->47410 47415 6e1b31c 47414->47415 47416 6e1bad5 47415->47416 47417 6e17800 WriteProcessMemory 47415->47417 47418 6e17808 WriteProcessMemory 47415->47418 47416->47333 47417->47415 47418->47415 47420 6e1b468 47419->47420 47422 6e178f0 ReadProcessMemory 47420->47422 47423 6e178f8 ReadProcessMemory 47420->47423 47421 6e1ba00 47422->47421 47423->47421 47430 6e17231 Wow64SetThreadContext 47424->47430 47431 6e17238 Wow64SetThreadContext 47424->47431 47425 6e1b528 47425->47424 47426 6e1b456 47425->47426 47428 6e178f0 ReadProcessMemory 47426->47428 47429 6e178f8 ReadProcessMemory 47426->47429 47427 6e1ba00 47428->47427 47429->47427 47430->47425 47431->47425 47433 6e1b328 47432->47433 47509 6e17180 47433->47509 47513 6e17188 47433->47513 47434 6e1b34e 47438 6e1b1d2 47437->47438 47439 6e17a90 CreateProcessA 47438->47439 47440 6e17a84 CreateProcessA 47438->47440 47439->47438 47440->47438 47442 6e1b1d2 47441->47442 47443 6e17a90 CreateProcessA 47442->47443 47444 6e17a84 CreateProcessA 47442->47444 47443->47442 47444->47442 47446 6e1b3f1 47445->47446 47517 6e17740 47446->47517 47521 6e17748 47446->47521 47447 6e1bb04 47451 6e1b528 47450->47451 47452 6e1b456 47451->47452 47456 6e17231 Wow64SetThreadContext 47451->47456 47457 6e17238 Wow64SetThreadContext 47451->47457 47454 6e178f0 ReadProcessMemory 47452->47454 47455 6e178f8 ReadProcessMemory 47452->47455 47453 6e1ba00 47454->47453 47455->47453 47456->47451 47457->47451 47459 6e1b4a1 47458->47459 47459->47458 47460 6e1bc08 47459->47460 47461 6e17231 Wow64SetThreadContext 47459->47461 47462 6e17238 Wow64SetThreadContext 47459->47462 47461->47459 47462->47459 47464 6e1b1d2 47463->47464 47465 6e17a90 CreateProcessA 47464->47465 47466 6e17a84 CreateProcessA 47464->47466 47465->47464 47466->47464 47468 6e1b339 47467->47468 47469 6e1b34e 47467->47469 47470 6e17180 ResumeThread 47468->47470 47471 6e17188 ResumeThread 47468->47471 47470->47469 47471->47469 47473 6e1b9dd 47472->47473 47474 6e1ba00 47473->47474 47475 6e178f0 ReadProcessMemory 47473->47475 47476 6e178f8 ReadProcessMemory 47473->47476 47475->47474 47476->47474 47478 6e17850 WriteProcessMemory 47477->47478 47480 6e178a7 47478->47480 47480->47381 47482 6e17850 WriteProcessMemory 47481->47482 47484 6e178a7 47482->47484 47484->47381 47486 6e17238 Wow64SetThreadContext 47485->47486 47488 6e172c5 47486->47488 47488->47387 47490 6e1723e Wow64SetThreadContext 47489->47490 47492 6e172c5 47490->47492 47492->47387 47494 6e178f8 ReadProcessMemory 47493->47494 47496 6e17987 47494->47496 47496->47395 47498 6e178fe ReadProcessMemory 47497->47498 47500 6e17987 47498->47500 47500->47395 47502 6e17b19 CreateProcessA 47501->47502 47504 6e17cdb 47502->47504 47506 6e17b19 CreateProcessA 47505->47506 47508 6e17cdb 47506->47508 47510 6e17188 ResumeThread 47509->47510 47512 6e171f9 47510->47512 47512->47434 47514 6e1718e ResumeThread 47513->47514 47516 6e171f9 47514->47516 47516->47434 47518 6e17788 VirtualAllocEx 47517->47518 47520 6e177c5 47518->47520 47520->47447 47522 6e17788 VirtualAllocEx 47521->47522 47524 6e177c5 47522->47524 47524->47447 47525 d0d498 47526 d0d4de GetCurrentProcess 47525->47526 47528 d0d530 GetCurrentThread 47526->47528 47529 d0d529 47526->47529 47530 d0d566 47528->47530 47531 d0d56d GetCurrentProcess 47528->47531 47529->47528 47530->47531 47532 d0d5a3 47531->47532 47533 d0d5cb GetCurrentThreadId 47532->47533 47534 d0d5fc 47533->47534 47535 d0b118 47539 d0b210 47535->47539 47547 d0b201 47535->47547 47536 d0b127 47540 d0b221 47539->47540 47543 d0b244 47539->47543 47540->47543 47555 d0b4a8 47540->47555 47559 d0b499 47540->47559 47541 d0b448 GetModuleHandleW 47542 d0b475 47541->47542 47542->47536 47543->47536 47544 d0b23c 47544->47541 47544->47543 47548 d0b221 47547->47548 47551 d0b244 47547->47551 47548->47551 47553 d0b4a8 LoadLibraryExW 47548->47553 47554 d0b499 LoadLibraryExW 47548->47554 47549 d0b448 GetModuleHandleW 47550 d0b475 47549->47550 47550->47536 47551->47536 47552 d0b23c 47552->47549 47552->47551 47553->47552 47554->47552 47556 d0b4bc 47555->47556 47558 d0b4e1 47556->47558 47563 d0ac50 47556->47563 47558->47544 47560 d0b4bc 47559->47560 47561 d0b4e1 47560->47561 47562 d0ac50 LoadLibraryExW 47560->47562 47561->47544 47562->47561 47564 d0b688 LoadLibraryExW 47563->47564 47566 d0b701 47564->47566 47566->47558 47302 6e1bf78 47303 6e1c103 47302->47303 47305 6e1bf9e 47302->47305 47305->47303 47306 6e1a4b8 47305->47306 47307 6e1c1f8 PostMessageW 47306->47307 47309 6e1c264 47307->47309 47309->47305 47567 2bd1cf0 47568 2bd1d58 CreateWindowExW 47567->47568 47570 2bd1e14 47568->47570

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 446 7a70d80-7a70da8 447 7a70daf-7a70ed6 446->447 448 7a70daa 446->448 457 7a70e7e-7a70efb 447->457 458 7a70ed8-7a70ee5 447->458 448->447 460 7a71425-7a71467 457->460 461 7a70f01-7a7163f 457->461 458->457 465 7a7146a-7a7146e 460->465 466 7a71474-7a7147a 465->466 467 7a70fd2-7a70fd6 465->467 466->460 468 7a7147c-7a714d7 466->468 469 7a70feb-7a70ff1 467->469 470 7a70fd8-7a70fe6 467->470 488 7a7150e-7a71538 468->488 489 7a714d9-7a7150c 468->489 472 7a7103c-7a71040 469->472 471 7a7106b-7a7109d 470->471 492 7a710c7 471->492 493 7a7109f-7a710ab 471->493 473 7a70ff3-7a70fff 472->473 474 7a71042-7a71059 472->474 479 7a71006-7a7100b 473->479 480 7a71001 473->480 476 7a7100e-7a71014 474->476 477 7a7105b-7a7105e 474->477 481 7a71016-7a7101a 476->481 482 7a71039 476->482 483 7a71061-7a71065 477->483 479->476 480->479 485 7a7101d-7a7102a 481->485 482->472 483->471 486 7a70fb8-7a70fcf 483->486 490 7a71030-7a71037 485->490 491 7a70f8f-7a70fb3 485->491 486->467 500 7a71541-7a715c0 488->500 489->500 490->474 491->483 496 7a710cd-7a710f3 492->496 498 7a710b5-7a710bb 493->498 499 7a710ad-7a710b3 493->499 506 7a710f6-7a710fa 496->506 502 7a710c5 498->502 499->502 515 7a715c7-7a715da 500->515 502->496 507 7a710fc-7a71134 506->507 508 7a71149-7a7117f 506->508 517 7a715e9-7a715ee 507->517 508->485 513 7a71185-7a711fe 508->513 528 7a71207-7a71208 513->528 529 7a71200 513->529 515->517 518 7a71605-7a71624 517->518 519 7a715f0-7a715fe 517->519 524 7a70f47-7a70f48 518->524 525 7a7162a-7a71631 518->525 519->518 524->491 526 7a71691-7a71698 524->526 530 7a7125f-7a71265 528->530 529->528 531 7a71267-7a71329 530->531 532 7a7120a-7a7122c 530->532 543 7a7132b-7a71364 531->543 544 7a7136a-7a7136e 531->544 533 7a71233-7a7125c 532->533 534 7a7122e 532->534 533->530 534->533 543->544 545 7a71370-7a713a9 544->545 546 7a713af-7a713b3 544->546 545->546 548 7a713b5-7a713ee 546->548 549 7a713f4-7a713f8 546->549 548->549 549->468 550 7a713fe-7a71416 549->550 550->506 552 7a7141c-7a71423 550->552 552->465
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q$:$paq$~
                                                                                        • API String ID: 0-2498672421
                                                                                        • Opcode ID: 7f6808b6b7b8d4f00a67a0fb6cd44d1e125d0a8b41000dcf3fc462a0f66b7550
                                                                                        • Instruction ID: 221b6c95472779615fce0aa4981ca7fa8945bdb632cff22a2475873c714b9f67
                                                                                        • Opcode Fuzzy Hash: 7f6808b6b7b8d4f00a67a0fb6cd44d1e125d0a8b41000dcf3fc462a0f66b7550
                                                                                        • Instruction Fuzzy Hash: 0842F6B5A00219DFDB25CFA9C980A99BBF2FF89304F1580E5E519AB221D731DD91DF10
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 876 2bcf146-2bcf14a 877 2bcfb0d-2bcfb0e 876->877 878 2bcf14b-2bcf160 876->878 882 2bcfb0f-2bcfb11 877->882 878->877 879 2bcf161-2bcf16c 878->879 881 2bcf172-2bcf17e 879->881 885 2bcf18a-2bcf199 881->885 883 2bcfadf-2bcfae0 882->883 884 2bcfb12 882->884 887 2bcfae7-2bcfae9 883->887 886 2bcfb13-2bcfb15 884->886 895 2bcf1f8-2bcf1fc 885->895 888 2bcfb17-2bcfb19 886->888 889 2bcfaeb-2bcfaf1 887->889 891 2bcfb1b-2bcfb1d 888->891 894 2bcfaf3 889->894 892 2bcfb1f-2bcfb21 891->892 893 2bcfadb 891->893 892->883 896 2bcfb23-2bcfb25 892->896 893->883 899 2bcfaf6 894->899 897 2bcf2a4-2bcf30e 895->897 898 2bcf202-2bcf20b 895->898 900 2bcfb27-2bcfb29 896->900 897->877 961 2bcf314-2bcf85b 897->961 901 2bcf106-2bcf112 898->901 902 2bcf211-2bcf227 898->902 903 2bcfaf7-2bcfafd 899->903 900->887 905 2bcfb2b-2bcfb2d 900->905 901->877 904 2bcf118-2bcf124 901->904 914 2bcf279-2bcf28b 902->914 915 2bcf229-2bcf22c 902->915 917 2bcfaff-2bcfb02 903->917 907 2bcf19b-2bcf1a1 904->907 908 2bcf126-2bcf13a 904->908 905->889 909 2bcfb2f-2bcfb31 905->909 907->877 916 2bcf1a7-2bcf1bf 907->916 908->907 924 2bcf13c-2bcf145 908->924 913 2bcfb33-2bcfb35 909->913 913->894 919 2bcfb37-2bcfb39 913->919 931 2bcfa4c-2bcfad9 914->931 932 2bcf291-2bcf2a1 914->932 915->877 920 2bcf232-2bcf26f 915->920 916->877 928 2bcf1c5-2bcf1ed 916->928 922 2bcfb03 917->922 919->903 925 2bcfb3b-2bcfb3d 919->925 920->897 953 2bcf271-2bcf277 920->953 929 2bcfb07-2bcfb08 922->929 924->876 930 2bcfb3f-2bcfb41 925->930 928->895 945 2bcfb0b-2bcfb0c 929->945 930->917 934 2bcfb43-2bcfb45 930->934 931->893 934->922 940 2bcfb47-2bcfb49 934->940 940->929 942 2bcfb4b-2bcfb4d 940->942 942->945 947 2bcfb4f-2bcfb51 942->947 945->877 945->899 947->882 949 2bcfb53-2bcfb55 947->949 949->886 952 2bcfb57-2bcfb59 949->952 952->888 955 2bcfb5b-2bcfb5d 952->955 953->914 953->915 955->891 956 2bcfb5f-2bcfb61 955->956 956->892 958 2bcfb63-2bcfb65 956->958 958->896 960 2bcfb67-2bcfb69 958->960 960->900 963 2bcfb6b-2bcfb6d 960->963 1091 2bcf85d-2bcf867 961->1091 1092 2bcf872-2bcf905 961->1092 963->905 966 2bcfb6f-2bcfb71 963->966 966->909 967 2bcfb73-2bcfb75 966->967 967->913 970 2bcfb77-2bcfb79 967->970 970->919 971 2bcfb7b-2bcfb7d 970->971 971->925 974 2bcfb7f-2bcfb81 971->974 974->930 975 2bcfb83-2bcfb85 974->975 975->934 977 2bcfb87-2bcfb89 975->977 977->940 978 2bcfb8b-2bcfb8d 977->978 978->942 980 2bcfb8f-2bcfb91 978->980 980->947 981 2bcfb93-2bcfb95 980->981 981->949 983 2bcfb97-2bcfb9a 981->983 984 2bcfb9b 983->984 985 2bcfb9f-2bcfbaa 984->985 987 2bcfbab-2bcfbb2 985->987 988 2bcfbb7-2bcfbba 987->988 990 2bcfbbf-2bcfbc2 988->990 992 2bcfbc7-2bcfbd6 990->992 993 2bcfbd7-2bcfbda 992->993 995 2bcfbdb-2bcfbdd 993->995 995->984 996 2bcfbdf-2bcfbe1 995->996 996->985 998 2bcfbe3-2bcfbe6 996->998 999 2bcfbe7-2bcfbea 998->999 1001 2bcfbeb-2bcfbed 999->1001 1001->987 1002 2bcfbef-2bcfbf2 1001->1002 1004 2bcfbf3-2bcfbf6 1002->1004 1005 2bcfbf7-2bcfbf9 1004->1005 1005->988 1007 2bcfbfb-2bcfbfe 1005->1007 1008 2bcfbff-2bcfc01 1007->1008 1008->990 1009 2bcfc03-2bcfc06 1008->1009 1011 2bcfc07-2bcfc09 1009->1011 1011->992 1012 2bcfc0b-2bcfc0e 1011->1012 1014 2bcfc0f-2bcfc12 1012->1014 1016 2bcfc13-2bcfc16 1014->1016 1017 2bcfc17-2bcfc19 1016->1017 1017->993 1019 2bcfc1b-2bcfc1d 1017->1019 1019->995 1020 2bcfc1f-2bcfc29 1019->1020 1020->999 1022 2bcfc2b-2bcfc2d 1020->1022 1022->1001 1023 2bcfc2f-2bcfc31 1022->1023 1023->1002 1025 2bcfc33-2bcfc35 1023->1025 1025->1004 1026 2bcfc37-2bcfc39 1025->1026 1026->1005 1028 2bcfc3b-2bcfc3d 1026->1028 1028->1007 1029 2bcfc3f-2bcfc41 1028->1029 1029->1008 1031 2bcfc43-2bcfc45 1029->1031 1031->1009 1032 2bcfc47-2bcfc49 1031->1032 1032->1011 1033 2bcfc4b-2bcfc4d 1032->1033 1033->1012 1035 2bcfc4f-2bcfc51 1033->1035 1035->1014 1036 2bcfc53-2bcfc55 1035->1036 1036->1016 1038 2bcfc57-2bcfc59 1036->1038 1038->1017 1040 2bcfc5b-2bcfc5d 1038->1040 1040->1019 1041 2bcfc5f-2bcfc61 1040->1041 1041->1020 1043 2bcfc63-2bcfd6b 1041->1043 1093 2bcf86d 1091->1093 1094 2bcf910-2bcf9a3 1091->1094 1092->1094 1096 2bcf9ae-2bcfa41 1093->1096 1094->1096 1096->931
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2037509597.0000000002BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BC0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_2bc0000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: D
                                                                                        • API String ID: 0-2746444292
                                                                                        • Opcode ID: f3a5353e3a023b16bf935b8b1ec54e00ccfb2fde858f2f2e5a08911e39b766de
                                                                                        • Instruction ID: a5411544c2548d57c826582673b2585481c2ae288754adcfc19ce34a8d1660d2
                                                                                        • Opcode Fuzzy Hash: f3a5353e3a023b16bf935b8b1ec54e00ccfb2fde858f2f2e5a08911e39b766de
                                                                                        • Instruction Fuzzy Hash: 99723CB4A042588FCB64DF64D8987EDBBB2EF89310F2441D9E849A7765DB309E85CF40
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6957de16d3fd80faadc34d5323cfcea9773c4fc25b5cf1e9e25e20e54d4f4192
                                                                                        • Instruction ID: 2dc591e65fda2dea5e629a90c0e72caaed2be694ea696c93d8137fb981f53a81
                                                                                        • Opcode Fuzzy Hash: 6957de16d3fd80faadc34d5323cfcea9773c4fc25b5cf1e9e25e20e54d4f4192
                                                                                        • Instruction Fuzzy Hash: 61F1E374D05328CFEB64CFA5C884BEDBBB6BB49300F10A195DA09AB255D730AAC5DF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b96b55015c014dbf6644e377a71504e2b3d045df1625c9a2f00613c49f17fa64
                                                                                        • Instruction ID: 43f173e2d6f0e7b90114b3811e088dfe81cf7ee367cea4ea1839e8bc9f018b6b
                                                                                        • Opcode Fuzzy Hash: b96b55015c014dbf6644e377a71504e2b3d045df1625c9a2f00613c49f17fa64
                                                                                        • Instruction Fuzzy Hash:
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 402 d0d488-d0d527 GetCurrentProcess 406 d0d530-d0d564 GetCurrentThread 402->406 407 d0d529-d0d52f 402->407 408 d0d566-d0d56c 406->408 409 d0d56d-d0d5a1 GetCurrentProcess 406->409 407->406 408->409 411 d0d5a3-d0d5a9 409->411 412 d0d5aa-d0d5c5 call d0d668 409->412 411->412 415 d0d5cb-d0d5fa GetCurrentThreadId 412->415 416 d0d603-d0d665 415->416 417 d0d5fc-d0d602 415->417 417->416
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32 ref: 00D0D516
                                                                                        • GetCurrentThread.KERNEL32 ref: 00D0D553
                                                                                        • GetCurrentProcess.KERNEL32 ref: 00D0D590
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00D0D5E9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Current$ProcessThread
                                                                                        • String ID:
                                                                                        • API String ID: 2063062207-0
                                                                                        • Opcode ID: b5ec63bb168cb7a28495d6e308ed3bf5a5cb716a7fb1291ccc5c4b9502bc9cbb
                                                                                        • Instruction ID: 22351a8fafd48b4299228cf6399589d9ade6316d4d9db520388cc284be3698dc
                                                                                        • Opcode Fuzzy Hash: b5ec63bb168cb7a28495d6e308ed3bf5a5cb716a7fb1291ccc5c4b9502bc9cbb
                                                                                        • Instruction Fuzzy Hash: 1B5175B09003488FDB14DFADD948BAEBFF1EF89314F24845AE409A73A0D7799944CB61
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 424 d0d498-d0d527 GetCurrentProcess 428 d0d530-d0d564 GetCurrentThread 424->428 429 d0d529-d0d52f 424->429 430 d0d566-d0d56c 428->430 431 d0d56d-d0d5a1 GetCurrentProcess 428->431 429->428 430->431 433 d0d5a3-d0d5a9 431->433 434 d0d5aa-d0d5c5 call d0d668 431->434 433->434 437 d0d5cb-d0d5fa GetCurrentThreadId 434->437 438 d0d603-d0d665 437->438 439 d0d5fc-d0d602 437->439 439->438
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32 ref: 00D0D516
                                                                                        • GetCurrentThread.KERNEL32 ref: 00D0D553
                                                                                        • GetCurrentProcess.KERNEL32 ref: 00D0D590
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00D0D5E9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Current$ProcessThread
                                                                                        • String ID:
                                                                                        • API String ID: 2063062207-0
                                                                                        • Opcode ID: 23f8999dcc35482269f6afb83505425f566d3b9ccee253714c1ece30a03751b4
                                                                                        • Instruction ID: 8457584ff32f0a534bc3230dc9093977190bdb4341cfb11862d224e1f65df3a5
                                                                                        • Opcode Fuzzy Hash: 23f8999dcc35482269f6afb83505425f566d3b9ccee253714c1ece30a03751b4
                                                                                        • Instruction Fuzzy Hash: 2E5186B09003088FDB04DFAED948BAEBBF5EF89314F248459E409A73A0D7389944CF61
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 554 7a70786-7a7078a 555 7a70ac3-7a70ae9 554->555 556 7a70790-7a70876 554->556 559 7a70aee-7a70af6 555->559 567 7a708a0 556->567 568 7a70878-7a70884 556->568 571 7a708a6-7a70955 567->571 569 7a70886-7a7088c 568->569 570 7a7088e-7a70894 568->570 572 7a7089e 569->572 570->572 579 7a70957-7a70963 571->579 580 7a7097f 571->580 572->571 582 7a70965-7a7096b 579->582 583 7a7096d-7a70973 579->583 581 7a70985-7a70aa2 580->581 598 7a70aa5 call 7a71bb0 581->598 599 7a70aa5 call 7a71bc0 581->599 584 7a7097d 582->584 583->584 584->581 596 7a70aab-7a70abd call 7a7e9f8 596->555 598->596 599->596
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $]q$$]q$$]q$$]q
                                                                                        • API String ID: 0-858218434
                                                                                        • Opcode ID: dbb99960973969637647beac01400a02e141a8dbb0709bdc067547ebe9ab9f5f
                                                                                        • Instruction ID: 8db77b2877bda4f70867e0b9a0d1362005d90ccd6309968fcedacfa28c7c3de0
                                                                                        • Opcode Fuzzy Hash: dbb99960973969637647beac01400a02e141a8dbb0709bdc067547ebe9ab9f5f
                                                                                        • Instruction Fuzzy Hash: 7DA1B874A00159CFDB64DF58C990BADBBB2FF88304F1085A9E809A7355DB319E86DF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 697 7a717d1-7a717d8 698 7a717da-7a717eb 697->698 699 7a71848-7a71852 697->699 704 7a717f2-7a71804 call 7a70d80 698->704 705 7a717ed 698->705 700 7a71853-7a71858 699->700 702 7a7185e-7a7186b 700->702 703 7a7191a-7a7191b 700->703 707 7a7186e-7a71973 702->707 706 7a71a05-7a71a0c 703->706 712 7a71809-7a7180a 704->712 705->704 717 7a7192f-7a71a18 706->717 713 7a71879-7a7197f 707->713 713->707 720 7a7188c-7a71890 713->720 717->713 723 7a71948-7a71950 717->723 720->717 721 7a71896-7a719b8 720->721 736 7a719bd-7a719f4 721->736 723->700 726 7a71956-7a7195a 723->726 726->717 727 7a7195c-7a71a24 726->727 736->703 742 7a719f9-7a71a00 736->742 742->703 742->706
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: '$8aq
                                                                                        • API String ID: 0-1019040932
                                                                                        • Opcode ID: ba75ad81514b400ec2a6e5a3b218dcc21a9c7309aedb2542a5713126d1263aba
                                                                                        • Instruction ID: 9645d9608c3881b3cb0dc9f53c7fd1d3ef09a9847dc33280bc7d1b28f2b14f22
                                                                                        • Opcode Fuzzy Hash: ba75ad81514b400ec2a6e5a3b218dcc21a9c7309aedb2542a5713126d1263aba
                                                                                        • Instruction Fuzzy Hash: A951D6B4E1524DDFCB00DFA8D980AADBBF5EB8A354F105529E42AE7350D730AA42CF51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1120 6e17a84-6e17b25 1122 6e17b27-6e17b31 1120->1122 1123 6e17b5e-6e17b7e 1120->1123 1122->1123 1124 6e17b33-6e17b35 1122->1124 1128 6e17b80-6e17b8a 1123->1128 1129 6e17bb7-6e17be6 1123->1129 1126 6e17b37-6e17b41 1124->1126 1127 6e17b58-6e17b5b 1124->1127 1130 6e17b43 1126->1130 1131 6e17b45-6e17b54 1126->1131 1127->1123 1128->1129 1132 6e17b8c-6e17b8e 1128->1132 1139 6e17be8-6e17bf2 1129->1139 1140 6e17c1f-6e17cd9 CreateProcessA 1129->1140 1130->1131 1131->1131 1133 6e17b56 1131->1133 1134 6e17bb1-6e17bb4 1132->1134 1135 6e17b90-6e17b9a 1132->1135 1133->1127 1134->1129 1137 6e17b9c 1135->1137 1138 6e17b9e-6e17bad 1135->1138 1137->1138 1138->1138 1141 6e17baf 1138->1141 1139->1140 1142 6e17bf4-6e17bf6 1139->1142 1151 6e17ce2-6e17d68 1140->1151 1152 6e17cdb-6e17ce1 1140->1152 1141->1134 1144 6e17c19-6e17c1c 1142->1144 1145 6e17bf8-6e17c02 1142->1145 1144->1140 1146 6e17c04 1145->1146 1147 6e17c06-6e17c15 1145->1147 1146->1147 1147->1147 1148 6e17c17 1147->1148 1148->1144 1162 6e17d78-6e17d7c 1151->1162 1163 6e17d6a-6e17d6e 1151->1163 1152->1151 1164 6e17d8c-6e17d90 1162->1164 1165 6e17d7e-6e17d82 1162->1165 1163->1162 1166 6e17d70 1163->1166 1168 6e17da0-6e17da4 1164->1168 1169 6e17d92-6e17d96 1164->1169 1165->1164 1167 6e17d84 1165->1167 1166->1162 1167->1164 1171 6e17db6-6e17dbd 1168->1171 1172 6e17da6-6e17dac 1168->1172 1169->1168 1170 6e17d98 1169->1170 1170->1168 1173 6e17dd4 1171->1173 1174 6e17dbf-6e17dce 1171->1174 1172->1171 1175 6e17dd5 1173->1175 1174->1173 1175->1175
                                                                                        APIs
                                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E17CC6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcess
                                                                                        • String ID:
                                                                                        • API String ID: 963392458-0
                                                                                        • Opcode ID: 6bee05f3384f17e968a2b78edcc80cfdec2e12fe816730d4c42089e37a29bd4e
                                                                                        • Instruction ID: 9082f8ca04a80bd0eb9e0fb3dc71b495248d7c13da74721546a15227ec2aa19e
                                                                                        • Opcode Fuzzy Hash: 6bee05f3384f17e968a2b78edcc80cfdec2e12fe816730d4c42089e37a29bd4e
                                                                                        • Instruction Fuzzy Hash: ADA16671D00319CFDF60CF68C841BADBAB2BF48704F1485AAE809AB284DB749985DF91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1177 6e17a90-6e17b25 1179 6e17b27-6e17b31 1177->1179 1180 6e17b5e-6e17b7e 1177->1180 1179->1180 1181 6e17b33-6e17b35 1179->1181 1185 6e17b80-6e17b8a 1180->1185 1186 6e17bb7-6e17be6 1180->1186 1183 6e17b37-6e17b41 1181->1183 1184 6e17b58-6e17b5b 1181->1184 1187 6e17b43 1183->1187 1188 6e17b45-6e17b54 1183->1188 1184->1180 1185->1186 1189 6e17b8c-6e17b8e 1185->1189 1196 6e17be8-6e17bf2 1186->1196 1197 6e17c1f-6e17cd9 CreateProcessA 1186->1197 1187->1188 1188->1188 1190 6e17b56 1188->1190 1191 6e17bb1-6e17bb4 1189->1191 1192 6e17b90-6e17b9a 1189->1192 1190->1184 1191->1186 1194 6e17b9c 1192->1194 1195 6e17b9e-6e17bad 1192->1195 1194->1195 1195->1195 1198 6e17baf 1195->1198 1196->1197 1199 6e17bf4-6e17bf6 1196->1199 1208 6e17ce2-6e17d68 1197->1208 1209 6e17cdb-6e17ce1 1197->1209 1198->1191 1201 6e17c19-6e17c1c 1199->1201 1202 6e17bf8-6e17c02 1199->1202 1201->1197 1203 6e17c04 1202->1203 1204 6e17c06-6e17c15 1202->1204 1203->1204 1204->1204 1205 6e17c17 1204->1205 1205->1201 1219 6e17d78-6e17d7c 1208->1219 1220 6e17d6a-6e17d6e 1208->1220 1209->1208 1221 6e17d8c-6e17d90 1219->1221 1222 6e17d7e-6e17d82 1219->1222 1220->1219 1223 6e17d70 1220->1223 1225 6e17da0-6e17da4 1221->1225 1226 6e17d92-6e17d96 1221->1226 1222->1221 1224 6e17d84 1222->1224 1223->1219 1224->1221 1228 6e17db6-6e17dbd 1225->1228 1229 6e17da6-6e17dac 1225->1229 1226->1225 1227 6e17d98 1226->1227 1227->1225 1230 6e17dd4 1228->1230 1231 6e17dbf-6e17dce 1228->1231 1229->1228 1232 6e17dd5 1230->1232 1231->1230 1232->1232
                                                                                        APIs
                                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E17CC6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcess
                                                                                        • String ID:
                                                                                        • API String ID: 963392458-0
                                                                                        • Opcode ID: cdd06493bf16ede4282ceaa416653f0b2f358148e99599e0d77451de7cf1e97f
                                                                                        • Instruction ID: aeeba6d79c08b29c316bc830c0e5b802f9dd423e6e8458f625134552689cd748
                                                                                        • Opcode Fuzzy Hash: cdd06493bf16ede4282ceaa416653f0b2f358148e99599e0d77451de7cf1e97f
                                                                                        • Instruction Fuzzy Hash: 25916671D00319CFDF60DF68C841BADBBB2BF49704F1485AAE809AB284DB749985DF91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00D0B466
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 4139908857-0
                                                                                        • Opcode ID: b3d004b08471ed3e5d91b33a170172a6b461b32c966353868f1d29bc4bbf0fd7
                                                                                        • Instruction ID: 083c8fd4d6b39f42da94ecc8a7d7a0fa5f955e071011282a53927667ecf227e1
                                                                                        • Opcode Fuzzy Hash: b3d004b08471ed3e5d91b33a170172a6b461b32c966353868f1d29bc4bbf0fd7
                                                                                        • Instruction Fuzzy Hash: 9A817770A04B058FDB24DF2AD08075ABBF1FF88310F14892ED08AD7A90DB34E845CBA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02BD1E02
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2037533820.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_2bd0000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: d2acf593520f31b688e159a58f5faa31bb3675e626ce63930458bedcb039cbe0
                                                                                        • Instruction ID: fd3faa95f9d86d7d9d9992d52b11bb22bc457a5f4fb94a1823d30cde1c24850a
                                                                                        • Opcode Fuzzy Hash: d2acf593520f31b688e159a58f5faa31bb3675e626ce63930458bedcb039cbe0
                                                                                        • Instruction Fuzzy Hash: 3F51B1B1D103499FDB14CFA9C984ADEBFB6FF48310F24816AE819AB250D7759845CF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02BD1E02
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2037533820.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_2bd0000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: 31de5aa78392aa8bc2ccd4399949b31297238edf1196358b9bc1247d2ea55384
                                                                                        • Instruction ID: 8e0b80dd1e337ec423fe1fbf5edce4d544d017ea219bec8fa91dd1379094ebf6
                                                                                        • Opcode Fuzzy Hash: 31de5aa78392aa8bc2ccd4399949b31297238edf1196358b9bc1247d2ea55384
                                                                                        • Instruction Fuzzy Hash: FE41B1B1D103099FDB14CFAAC984ADEBBB5FF48314F64816AE419AB210D7759845CF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 02BD4381
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2037533820.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_2bd0000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallProcWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2714655100-0
                                                                                        • Opcode ID: 33914fcc4bd905ed02bc62e3ab9bd0d4c46854a8cf171b6515df6fbbd4813d96
                                                                                        • Instruction ID: ab50b7a25dd948d957b546949d7b36bce3c6883aea297643c05950abeb46f569
                                                                                        • Opcode Fuzzy Hash: 33914fcc4bd905ed02bc62e3ab9bd0d4c46854a8cf171b6515df6fbbd4813d96
                                                                                        • Instruction Fuzzy Hash: 1D410AB5A003098FCB14DF99D488AAAFBF5FF88324F24C499D519A7361D375A841CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 00D05F41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: a89d0879b0eb84d9809f548a17fce5b05d0ef73031c16a34dc819b0e6977bc38
                                                                                        • Instruction ID: 9c2cf62611239784c2a8869ffc5bceccdbc49122d53c87e29293d0f8f6018fea
                                                                                        • Opcode Fuzzy Hash: a89d0879b0eb84d9809f548a17fce5b05d0ef73031c16a34dc819b0e6977bc38
                                                                                        • Instruction Fuzzy Hash: 2241FFB0C00719CADB24DFA9C844BDEFBF5BF49304F20806AD408AB295DB756946CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 00D05F41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: 6d7df56c8a70712171aacdbb88cc90503fc44555c3eb6b28c414c5f349e97f2b
                                                                                        • Instruction ID: 2f1a680061db02aa05466d8e48326f794c45df080338aaa0e17c984ec5b0cae7
                                                                                        • Opcode Fuzzy Hash: 6d7df56c8a70712171aacdbb88cc90503fc44555c3eb6b28c414c5f349e97f2b
                                                                                        • Instruction Fuzzy Hash: 2541F1B1C00719CEDB24DFA9C984BDEFBB5BF49304F20806AD409AB295DB756946CF60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E17898
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3559483778-0
                                                                                        • Opcode ID: 9a446b1ba2c6e2e3f26cf836f16022b4b7619062fbdb25ba33c6d5ef58c4fa00
                                                                                        • Instruction ID: 4cdcc6acf5a8a2c485f62551eac37b6e740cf55d2b3f5f06685bd8b28e2ce2a8
                                                                                        • Opcode Fuzzy Hash: 9a446b1ba2c6e2e3f26cf836f16022b4b7619062fbdb25ba33c6d5ef58c4fa00
                                                                                        • Instruction Fuzzy Hash: 142135B59003199FCF10DFA9C985BEEBBF1FF48314F10842AE519A7250D7799941DBA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E17898
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3559483778-0
                                                                                        • Opcode ID: 9d63d2bd9ce467b2fa3ca3bc71cf026a5fe44437185c7d62ddd9db600b060a50
                                                                                        • Instruction ID: b3eddf0e8c705e6f1acfff795e564a653cb84095997a2a1b51f375a2671695bf
                                                                                        • Opcode Fuzzy Hash: 9d63d2bd9ce467b2fa3ca3bc71cf026a5fe44437185c7d62ddd9db600b060a50
                                                                                        • Instruction Fuzzy Hash: 6F2113B59003599FCF10DFAAC985BEEBBF5FF48314F10842AE919A7240D7789944DBA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E17978
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessRead
                                                                                        • String ID:
                                                                                        • API String ID: 1726664587-0
                                                                                        • Opcode ID: 942ec845a1bc4baf0e741ff6a2cfc433cc94b3fc873831a1edde49ceb25ebace
                                                                                        • Instruction ID: b0a41c349d96e1625ea8bb9aa9e3eec2ab1a57c23d44f94dfca89ed284ff6924
                                                                                        • Opcode Fuzzy Hash: 942ec845a1bc4baf0e741ff6a2cfc433cc94b3fc873831a1edde49ceb25ebace
                                                                                        • Instruction Fuzzy Hash: 1A2105B1C003499FCB10DFAAC981AEEBBF5FF48710F50842AE519A7250C7789945DBA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D0D767
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: DuplicateHandle
                                                                                        • String ID:
                                                                                        • API String ID: 3793708945-0
                                                                                        • Opcode ID: 203c13f109da220b90e9302dcb2032a3f8dc87237ac67d7453ce679937afd988
                                                                                        • Instruction ID: e9d17141a9f038ebb9b09abbf65569d9f1b138620f184e5214e4005778464889
                                                                                        • Opcode Fuzzy Hash: 203c13f109da220b90e9302dcb2032a3f8dc87237ac67d7453ce679937afd988
                                                                                        • Instruction Fuzzy Hash: C42116B59002489FDB10CFAAD584AEEBFF5FF48310F14805AE958A3350C378A941CF60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E172B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ContextThreadWow64
                                                                                        • String ID:
                                                                                        • API String ID: 983334009-0
                                                                                        • Opcode ID: 61d892404189fdbd8d89a32849e8c5c2477a70c86c6e93fcb528624b96f8e39b
                                                                                        • Instruction ID: a8d5e5ad73e5bc457daceac898e3fe7a6d94d815183a1e1a5ec5cd7ad31893a1
                                                                                        • Opcode Fuzzy Hash: 61d892404189fdbd8d89a32849e8c5c2477a70c86c6e93fcb528624b96f8e39b
                                                                                        • Instruction Fuzzy Hash: A62138B5D003098FDB50DFAAC4857EEBBF5EF88324F54842AE419A7240CB789945CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E172B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ContextThreadWow64
                                                                                        • String ID:
                                                                                        • API String ID: 983334009-0
                                                                                        • Opcode ID: 7e8f1c6ac2e20bfb98f864c2bc78950fb6568df500631ac31bbac8330d77f89b
                                                                                        • Instruction ID: 24ff2d6414d6b6e96931bd432815e6f92353ff9609b8c2c49b5205fda71af794
                                                                                        • Opcode Fuzzy Hash: 7e8f1c6ac2e20bfb98f864c2bc78950fb6568df500631ac31bbac8330d77f89b
                                                                                        • Instruction Fuzzy Hash: 9B2118B1D003098FDB50DFAAC4857EEBBF5EF48314F548429D519A7241CB789945CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E17978
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessRead
                                                                                        • String ID:
                                                                                        • API String ID: 1726664587-0
                                                                                        • Opcode ID: ce3bd6657eb0fd20174d6b15e670575a6231b86fc69931959a12af74dc0435c7
                                                                                        • Instruction ID: 35236d5f39ee6a2cc8a33491e156b798d552894191b6d5656edeef18548ce81f
                                                                                        • Opcode Fuzzy Hash: ce3bd6657eb0fd20174d6b15e670575a6231b86fc69931959a12af74dc0435c7
                                                                                        • Instruction Fuzzy Hash: 452125B1C003499FCB10DFAAC881AEEFBF5FF48310F50842AE519A7250C7389945DBA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D0D767
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: DuplicateHandle
                                                                                        • String ID:
                                                                                        • API String ID: 3793708945-0
                                                                                        • Opcode ID: b7f04b352b99b400edb946369ce4cdebbb766c2d734c69a4f4579c9652a032d8
                                                                                        • Instruction ID: 23b5c4f8cc5967478f60f68b84422409c462fb151b805566276315a15d69c5be
                                                                                        • Opcode Fuzzy Hash: b7f04b352b99b400edb946369ce4cdebbb766c2d734c69a4f4579c9652a032d8
                                                                                        • Instruction Fuzzy Hash: E421E2B59003089FDB10CFAAD984ADEBFF9FB48310F14841AE918A3350D378A940CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D0B4E1,00000800,00000000,00000000), ref: 00D0B6F2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 1029625771-0
                                                                                        • Opcode ID: 407810a6151a75f5745b4e1276bf06b130a1f5f5b3e47c739e347f56270f1772
                                                                                        • Instruction ID: 9c1288fbbfbe068f6e197d3a8822034411705b7792a10bd4a1d640965e9f6e1d
                                                                                        • Opcode Fuzzy Hash: 407810a6151a75f5745b4e1276bf06b130a1f5f5b3e47c739e347f56270f1772
                                                                                        • Instruction Fuzzy Hash: 291114B6D042498FDB10CF9AD484AEEFBF5AB98310F14845AD419A7650C379A945CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D0B4E1,00000800,00000000,00000000), ref: 00D0B6F2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 1029625771-0
                                                                                        • Opcode ID: 5a7ea001271d9c8cc41dc35d76ba693375bf340af259afc05dc85831d54f1310
                                                                                        • Instruction ID: 8b2211f8ffd5d955a4482c34f11ccd857643e648c9a1f5e097f6e670fb61d61c
                                                                                        • Opcode Fuzzy Hash: 5a7ea001271d9c8cc41dc35d76ba693375bf340af259afc05dc85831d54f1310
                                                                                        • Instruction Fuzzy Hash: 7B1114B6C043498FCB10DF9AD444BDEFBF4EB98320F54846AD519A7240C379A945CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E177B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: feab6549b13a6e84b6aa50b05fc278aab9e0fac41337b0826fcd9431b05b93be
                                                                                        • Instruction ID: 40586e57e774c785cecff9cd98b1633c42a670b4d360792cd72fe9196b1c5c3d
                                                                                        • Opcode Fuzzy Hash: feab6549b13a6e84b6aa50b05fc278aab9e0fac41337b0826fcd9431b05b93be
                                                                                        • Instruction Fuzzy Hash: 601156759002499FCB10DFAAC845BEEBFF5FF88314F24841AE519A7250CB3A9540CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E177B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 8872390cbec18c09c426b3ba9189cd04241319bbb60b7b9750bbb49965029bdd
                                                                                        • Instruction ID: 88001c4d013a21807eb106cda7d626efe4f3c62d3acdfda471d5e6ef32703a93
                                                                                        • Opcode Fuzzy Hash: 8872390cbec18c09c426b3ba9189cd04241319bbb60b7b9750bbb49965029bdd
                                                                                        • Instruction Fuzzy Hash: 1C1126758003499FCB10DFAAC845AEEBFF5EF88714F14841AE519A7250C779A540CBA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: ac51e8fc6515cb8aff5a4d70d9745dbcdd451b4e9178f2f60587d45258a193e9
                                                                                        • Instruction ID: 5bb26ede8192d734aa7a3c93d6316fbd7c3a83beac11e560dca1bf93bf26f986
                                                                                        • Opcode Fuzzy Hash: ac51e8fc6515cb8aff5a4d70d9745dbcdd451b4e9178f2f60587d45258a193e9
                                                                                        • Instruction Fuzzy Hash: EB1158B1D003088FDB20DFAAC8457EEFBF5EF88724F248459D419A7240CB79A945CBA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: 13e9197ffa7d981eecbfbe35c4717400b00aef8c2414b4073739ae42d169173d
                                                                                        • Instruction ID: 136a6ce683d8a740bbcb47f5c237a75e8e38fac3a0f736ffa62a9df55693c425
                                                                                        • Opcode Fuzzy Hash: 13e9197ffa7d981eecbfbe35c4717400b00aef8c2414b4073739ae42d169173d
                                                                                        • Instruction Fuzzy Hash: 1F113AB1D003488FDB20DFAAC8457EEFBF5EF88714F248419D519A7240CB79A545CBA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E1C255
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost
                                                                                        • String ID:
                                                                                        • API String ID: 410705778-0
                                                                                        • Opcode ID: 3e61c0d15f1db5a3dfdbbe21e16feccfb1bc050ad748d2ea1668acdf07dfa0c4
                                                                                        • Instruction ID: 361f4e63bd78164f32d277a6931274ea9261dd9c60cc1c955633a5dcea3f6015
                                                                                        • Opcode Fuzzy Hash: 3e61c0d15f1db5a3dfdbbe21e16feccfb1bc050ad748d2ea1668acdf07dfa0c4
                                                                                        • Instruction Fuzzy Hash: 7B1113B58003499FCB10DF8AC444BDEBBF8EB48710F20840AD958A7200C379A544CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00D0B466
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 4139908857-0
                                                                                        • Opcode ID: 2995385f2f91c4cc120909fe1297d49ade9efa492f1e49883995811d8faa4e69
                                                                                        • Instruction ID: 6a487e48609b00f2a16ef092ebe4f89c7ae23c3f827e43b91f33500a8eddc4ed
                                                                                        • Opcode Fuzzy Hash: 2995385f2f91c4cc120909fe1297d49ade9efa492f1e49883995811d8faa4e69
                                                                                        • Instruction Fuzzy Hash: 59110FB6C003498FCB10DF9AD444BDEFBF4EB88324F14845AD419A7251C379A645CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E1C255
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost
                                                                                        • String ID:
                                                                                        • API String ID: 410705778-0
                                                                                        • Opcode ID: 139e856b10004734f9b6afe4d573e340668b5576ddd7d8d254308dc19bc78a4b
                                                                                        • Instruction ID: 937df53cf1e2545277f9d9e5a51cd3c118aa6251576152371f44c85b0f14cba7
                                                                                        • Opcode Fuzzy Hash: 139e856b10004734f9b6afe4d573e340668b5576ddd7d8d254308dc19bc78a4b
                                                                                        • Instruction Fuzzy Hash: E51106B58007499FDB50DF9AD549BDEBBF8FB48710F208459E918A7200C379A944CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 8aq
                                                                                        • API String ID: 0-538729646
                                                                                        • Opcode ID: 4d1b08b1b285bc8bc00bbebd86f9c6401048062f41b0fdd54539f862a07a4ce6
                                                                                        • Instruction ID: d1d3d55ae3ac211c9a47921609c4fb9693d6da59233e6d7ad1b6450f676ca64d
                                                                                        • Opcode Fuzzy Hash: 4d1b08b1b285bc8bc00bbebd86f9c6401048062f41b0fdd54539f862a07a4ce6
                                                                                        • Instruction Fuzzy Hash: 0751D5B4E1524DDFCB00CFA8D980AADBBF5FB8A354F105529E425E7354E7309A42CB51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 8aq
                                                                                        • API String ID: 0-538729646
                                                                                        • Opcode ID: ee1a53895afb6ef7c46cebfef84b3e3d75f05922f8811dab79ef51556ad216c5
                                                                                        • Instruction ID: a9c7003baad754aee5942531d534d0cc7fdcdfb0a33cc6fdd258e859bd40aa4a
                                                                                        • Opcode Fuzzy Hash: ee1a53895afb6ef7c46cebfef84b3e3d75f05922f8811dab79ef51556ad216c5
                                                                                        • Instruction Fuzzy Hash: 6A51D4B4E1524DDFCB00CFA9D9809ADBBF5EB8A350F10552AE425E7350E7309942CF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 5af271e0fb0b2d3d545f34ba2f1f648d0c4c5b17a380b1abff3ea72a4ad08cc6
                                                                                        • Instruction ID: 5975d8346878927aea70fd6ee767c1743d23ccbaccd09f360a2824b2ee345630
                                                                                        • Opcode Fuzzy Hash: 5af271e0fb0b2d3d545f34ba2f1f648d0c4c5b17a380b1abff3ea72a4ad08cc6
                                                                                        • Instruction Fuzzy Hash: 13518371B102058FCB14EFB998999AFBBFAEFC5320B158929E425D7351DF309D0587A0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 9b10383abe15a49f99779da5f6a48fd8b5d00f2acd313ae0cb5b1ec5e63fb65a
                                                                                        • Instruction ID: 75aacf5b8846001b818fc12238844fc41abea2f9185871d4d7118dceff1a733c
                                                                                        • Opcode Fuzzy Hash: 9b10383abe15a49f99779da5f6a48fd8b5d00f2acd313ae0cb5b1ec5e63fb65a
                                                                                        • Instruction Fuzzy Hash: A5115E71F0020A9FCB04EBB99D115EEB6F6AFC9724B504079C519E7244EF318E02CBA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: '
                                                                                        • API String ID: 0-1997036262
                                                                                        • Opcode ID: f30635d174ed1855cb1c80f974a31cce7f1381efe68322dca9db12599c09332a
                                                                                        • Instruction ID: 1ba82823135b33a272d3589e920ac98818bb8cfdbaf5587ec06d837e7b57a24c
                                                                                        • Opcode Fuzzy Hash: f30635d174ed1855cb1c80f974a31cce7f1381efe68322dca9db12599c09332a
                                                                                        • Instruction Fuzzy Hash: 27D0A7F005F10CD6C300D764DD0AA6F76FC9782211F000844D419131918AB16E51DE93
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 89bfc97e8f99d938640e86ee3762bfad1c98e7e9d9b103033248c682b2eb9ddb
                                                                                        • Instruction ID: 6a1852f2e72b5acb786b20a5f9cea441d40c8040188e64aad2fa193776f64534
                                                                                        • Opcode Fuzzy Hash: 89bfc97e8f99d938640e86ee3762bfad1c98e7e9d9b103033248c682b2eb9ddb
                                                                                        • Instruction Fuzzy Hash: F651C6B4E18219DFCB14DFA9C88099DBBF1FF89311F108569E826A7351D730A941CF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3f75d0a7d87c6a62fbb95d05282110dfe1ea563a6d9d5d7818b07b79da550bf0
                                                                                        • Instruction ID: 69b496927ca3544b9c8234c0996478b620e3ffdf33eefbee6c5076e219d744c2
                                                                                        • Opcode Fuzzy Hash: 3f75d0a7d87c6a62fbb95d05282110dfe1ea563a6d9d5d7818b07b79da550bf0
                                                                                        • Instruction Fuzzy Hash: 2451D4B0E152089FCB05DFA8E985AAEBBB6FF89310F109025E505A7358CB749D45CF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8d29d067b091ca765266c1d5dd6558d06104e58d70da27b39c9ba9841fd41748
                                                                                        • Instruction ID: 75c07064701b79ff1d1ea9511e1829109896bfa1c933957d26e451bb2def0ba5
                                                                                        • Opcode Fuzzy Hash: 8d29d067b091ca765266c1d5dd6558d06104e58d70da27b39c9ba9841fd41748
                                                                                        • Instruction Fuzzy Hash: 4A41F074E112189FCB00DFA8D884AEEBBB1FF88320F109565E814B7355DB35A994CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 353b5f6893afb8982babce820f5abe611fda03d215a2bf8cc613a1f4896913a5
                                                                                        • Instruction ID: e22f0e1b9b9105c68c1a362cc965f42ce900e5cf0599f59f5bbd05e7d778a2ea
                                                                                        • Opcode Fuzzy Hash: 353b5f6893afb8982babce820f5abe611fda03d215a2bf8cc613a1f4896913a5
                                                                                        • Instruction Fuzzy Hash: D051B6B4A00218CFDB54DF68C891BEEBBB1EF49314F2084A9E419A7355DB71AE81CF51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f9aca8e2fac5e6341ef547beb5cf646965e9d3c9e09d4f670b2d5357ceded8dd
                                                                                        • Instruction ID: 89e43e8e1dc54712a34b22bd76fb031ed49fcd92079e860546350657cd672041
                                                                                        • Opcode Fuzzy Hash: f9aca8e2fac5e6341ef547beb5cf646965e9d3c9e09d4f670b2d5357ceded8dd
                                                                                        • Instruction Fuzzy Hash: D131E9B4E2420EDBCB04DFA9D9819EEBBF5EB8A200F109525E825E7300D7309E41CF51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6e8b8d3f7be48ea9d3bb4812839e6520ed5dc7c51d6cd0860a6e9418f8c50660
                                                                                        • Instruction ID: 47a30a3194c8044d0d6a9a286334d5e7cc098ba1c001417266340bd80cc8f8a3
                                                                                        • Opcode Fuzzy Hash: 6e8b8d3f7be48ea9d3bb4812839e6520ed5dc7c51d6cd0860a6e9418f8c50660
                                                                                        • Instruction Fuzzy Hash: 9531B7B8E1520EDFCB04DFA9D9819AEBBF5EB8A244F109565E825E7300E7309A41CF51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9db7754d2cb341519cffeb94142c70bcdd8dd023f404b02985a80cce3638389a
                                                                                        • Instruction ID: 18364bbe4f78d9be487f436733a53871621a27a57eea595951e47f0230b090a8
                                                                                        • Opcode Fuzzy Hash: 9db7754d2cb341519cffeb94142c70bcdd8dd023f404b02985a80cce3638389a
                                                                                        • Instruction Fuzzy Hash: 053139B6A00208AFCB10DFA9D945ADEBFF5EF48310F10846AE919E7210D775A950CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4471baf98280bf6c0a093295201751c8d5bd5e06ca7a34b12d780bdb55867bdb
                                                                                        • Instruction ID: 2bab48238d0721b6327103b87edef089e56d72fafdca66477ec662166bd91317
                                                                                        • Opcode Fuzzy Hash: 4471baf98280bf6c0a093295201751c8d5bd5e06ca7a34b12d780bdb55867bdb
                                                                                        • Instruction Fuzzy Hash: F8312BB4E002099FDF05DF98E881AEEBBB5FF88310F149525E914A7394DB719A41CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a5d3cbd8dd51fdf41f1562ffbdfd98e54374501b73cf60f31ca2531a7ae64d8f
                                                                                        • Instruction ID: e481fe67a338c326d70db328ae96f30dd594a250723bab9024dd14786b01616d
                                                                                        • Opcode Fuzzy Hash: a5d3cbd8dd51fdf41f1562ffbdfd98e54374501b73cf60f31ca2531a7ae64d8f
                                                                                        • Instruction Fuzzy Hash: D121E9B4E1924DDFCB00CFE9D9419EEBBF5EB8A200F10546AE425B7301D7359941CBA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6183db976909b6f4a79b2a25ee132016930b7a0712fd5ab166e8937ffac84c19
                                                                                        • Instruction ID: d84e0e0c9244d2d8044c72c12199ceca3cb5c72fc56b944eb7925c23ebc55577
                                                                                        • Opcode Fuzzy Hash: 6183db976909b6f4a79b2a25ee132016930b7a0712fd5ab166e8937ffac84c19
                                                                                        • Instruction Fuzzy Hash: 5231A774A14508DFC704DF5AE689A9DBBF1FF88300B6280D5E4489B369DB31AE15DB41
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0f4350408d85c102919c3a19877c98f0517e7e5d0333201389e964ae3cd602ee
                                                                                        • Instruction ID: 6924ce35dafe69a1de24ec2eb69ac7b209aaec64f17d840e8521af6c68fa03c8
                                                                                        • Opcode Fuzzy Hash: 0f4350408d85c102919c3a19877c98f0517e7e5d0333201389e964ae3cd602ee
                                                                                        • Instruction Fuzzy Hash: 812181B2D147548FD719CFAADC4169EBBF2EFC6300F09C0AAD4189B266CB345906CB11
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2efe6cd76ae407285f67371c09af055c66fe10c6819916436b34599e1593d48f
                                                                                        • Instruction ID: 2bb914069dd79b668f4e73eba4ea716b9850abb3e4eefc4d5b1c47c7498e4482
                                                                                        • Opcode Fuzzy Hash: 2efe6cd76ae407285f67371c09af055c66fe10c6819916436b34599e1593d48f
                                                                                        • Instruction Fuzzy Hash: 0831F4B0D11218DFDB20DF99C989B9EBFF9AB48320F648059E414BB240C7B55845CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c67563bcfcbe506b60f86865888bbbf5a2231486f5b540ab4982d28600c1e51a
                                                                                        • Instruction ID: 5c384303190693cc6b127cb3a383181b5323161627c6da3e23088637f97cea90
                                                                                        • Opcode Fuzzy Hash: c67563bcfcbe506b60f86865888bbbf5a2231486f5b540ab4982d28600c1e51a
                                                                                        • Instruction Fuzzy Hash: F421D5B4E1521DDBCB00DFE9D9819EEBBF5EB8A200F10942AE425B3300D7309901CBA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e821b46b80129356cfce5742a6bc0d72056b11bf8e70b21f9f7ed7bb439e34b5
                                                                                        • Instruction ID: 40caf63be2134fe43e6bee8a0ac624379771c1472471e8253896f260f14aca34
                                                                                        • Opcode Fuzzy Hash: e821b46b80129356cfce5742a6bc0d72056b11bf8e70b21f9f7ed7bb439e34b5
                                                                                        • Instruction Fuzzy Hash: 3B316D70529A18CBE300AF11F98F2253F35FB85309B8206D4E0E8151C9DFBE85B9CB4A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 891052ddaa9456d4b32172cb0c49fa52f1da66489ec04b8da0d70a6e56a9f569
                                                                                        • Instruction ID: ea95187b1096efc86b24b99d10bd575ab0e95a13041fa19a4ff94e5f17bb4a6c
                                                                                        • Opcode Fuzzy Hash: 891052ddaa9456d4b32172cb0c49fa52f1da66489ec04b8da0d70a6e56a9f569
                                                                                        • Instruction Fuzzy Hash: 3221E4B59043499FCB10DF9AD984ADEBFF4FF48310F108429E919A7210D379A954CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 083f2276fd07a1256f9541a42cf6b2d26f8554f975aaac08cbfba15036d8e1da
                                                                                        • Instruction ID: bce116bd1fe43a6652515b6f019476dd76c174a519199270fc27acfb9c2f04c6
                                                                                        • Opcode Fuzzy Hash: 083f2276fd07a1256f9541a42cf6b2d26f8554f975aaac08cbfba15036d8e1da
                                                                                        • Instruction Fuzzy Hash: 1611E5B1E156188BDB18CFABD84559EFBF7AFC9300F14C03A9818AB358DB305906CB40
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8a21c107e820f595bd39f3f8b3011068f71cdbcdda34e65ee15969ef38affc5d
                                                                                        • Instruction ID: 579a0bb3c7b8797afd9ffbf85da95938e7806c00081078d132d7700971acb388
                                                                                        • Opcode Fuzzy Hash: 8a21c107e820f595bd39f3f8b3011068f71cdbcdda34e65ee15969ef38affc5d
                                                                                        • Instruction Fuzzy Hash: 1911D474A24608EFC740DF99F189999BFB0FF48310F5280D1E888973A9DB31DAA4CB41
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 257997169edbddc2621c9c03e86a2ca533f037c6dd423d494b54f3eb047b88f2
                                                                                        • Instruction ID: fa8379d66f231dce4e1b7143ab836fddf9f3c2e0e7a972b0393a68322d614fed
                                                                                        • Opcode Fuzzy Hash: 257997169edbddc2621c9c03e86a2ca533f037c6dd423d494b54f3eb047b88f2
                                                                                        • Instruction Fuzzy Hash: 6801BBB0900219DFDB14DF6AC8447EEBAF9BF49364F148625E424AE290DB744A84CFE1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 61ca0f46a7c48520ad092c3b66844964c4c585ee4ddf774d8c45c7c64af2467c
                                                                                        • Instruction ID: 78af295f8227a712b02619c6a146ae6494e7662f50caf3c307752e254b0607ba
                                                                                        • Opcode Fuzzy Hash: 61ca0f46a7c48520ad092c3b66844964c4c585ee4ddf774d8c45c7c64af2467c
                                                                                        • Instruction Fuzzy Hash: 31E06D727001286F9314DAAEDC94C6BBBEDFBCC670361807AF508C7311DA319C01C6A0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0007c0100a577819dc9413b64da0f1e077fb95debdfd8d407f446c71862c818a
                                                                                        • Instruction ID: 5248bdb57eefc981b0bce626579b64ad6a3e7744aa112c2b68d17a7720cf5fec
                                                                                        • Opcode Fuzzy Hash: 0007c0100a577819dc9413b64da0f1e077fb95debdfd8d407f446c71862c818a
                                                                                        • Instruction Fuzzy Hash: FAE09AB106E3C89FC7128730AC2A7AA7F788F43216F0945C6E045C34E3CA642E18D7A2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 821544041b0c5f723a1c24173e7e6074872f8dfcd4c38d6358fbaec6b1c00319
                                                                                        • Instruction ID: ce93c441ab4f4721c9973e39a67468b00be1e8d3c11d28efdc1d73435bc8ae43
                                                                                        • Opcode Fuzzy Hash: 821544041b0c5f723a1c24173e7e6074872f8dfcd4c38d6358fbaec6b1c00319
                                                                                        • Instruction Fuzzy Hash: 9DE09A74809208FFCB05DFA8D9019ACBF75EB49310F14C099EC0413350CB329A21EB80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 616d2e09c1dff1bb98cf2c1130e1424301a8c8f5fc38f6f4347cf9d8cbd2c565
                                                                                        • Instruction ID: c9e0b18f8f55df660ab02b13be5a0a6540721ee09a653fe0869813b800de1aeb
                                                                                        • Opcode Fuzzy Hash: 616d2e09c1dff1bb98cf2c1130e1424301a8c8f5fc38f6f4347cf9d8cbd2c565
                                                                                        • Instruction Fuzzy Hash: E2E04F79919108FFCB04DFA8D9459ACBF75EB49310F14C1A9EC5417351CB329A61EB80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 13e29ad91bea8e991351c9002dd9621e67abb8c21b966b048fce6c502490bde6
                                                                                        • Instruction ID: 9a6bc626aea97d887b47b39418503335d7c9be9ae9f9287390183b8f191c975c
                                                                                        • Opcode Fuzzy Hash: 13e29ad91bea8e991351c9002dd9621e67abb8c21b966b048fce6c502490bde6
                                                                                        • Instruction Fuzzy Hash: 4CE046B1529108DFC700EBB49E0969E7BB9AF0A201F0459A5E40593160EF7A8A00DBA2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b4dfe6fab3645aa2f965ef7d465753bef93d6eedbec31d0dd9cfcd431d3256bf
                                                                                        • Instruction ID: 2a88b05bbf39cfbd2fd3e6bc88fde04a78c18c7d0a2facbbd0716f9eaab8e992
                                                                                        • Opcode Fuzzy Hash: b4dfe6fab3645aa2f965ef7d465753bef93d6eedbec31d0dd9cfcd431d3256bf
                                                                                        • Instruction Fuzzy Hash: F8E08674919108FFC708DFA8D9459ACBF74EB85311F10C1A9DC4413351DB329E52DB80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2a833a7ec0147767bde25bc9637e75b293ce04f6a5f786261db821ebb8b242a8
                                                                                        • Instruction ID: fa3ba6e3cbc28a48abc5d2547c5bf070a27fea85ffb7e8cc4636a487cfa74597
                                                                                        • Opcode Fuzzy Hash: 2a833a7ec0147767bde25bc9637e75b293ce04f6a5f786261db821ebb8b242a8
                                                                                        • Instruction Fuzzy Hash: 7BE01274959108EFCB04DFA8E9455ACBBB8EB86315F14C1EDD84827351CB339E52DB81
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 91c77d58f2d3a96a423617ecf8ec2316c6f6f0cb8016bbbffbadcf3bac71a4ef
                                                                                        • Instruction ID: 04d44d3b9dbe07b439eb599fa5d2c12ecefd1a0a1f0d644d3991f34154f9c59b
                                                                                        • Opcode Fuzzy Hash: 91c77d58f2d3a96a423617ecf8ec2316c6f6f0cb8016bbbffbadcf3bac71a4ef
                                                                                        • Instruction Fuzzy Hash: 8DD05EB049D208EBC300DB75E80ABAA7A7C9B8231AF004444E409531908F712F40DA91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4f22d1cd312bc843ca1aa1376745b9686ffb20c2a8d9c5a7698992feafae15f9
                                                                                        • Instruction ID: b9f1fee5a1fb9401d6186954e2f365fba7763504417cface5956dd70d1434be0
                                                                                        • Opcode Fuzzy Hash: 4f22d1cd312bc843ca1aa1376745b9686ffb20c2a8d9c5a7698992feafae15f9
                                                                                        • Instruction Fuzzy Hash: C2D0A7F026B508D6C310E764DD06BAE76BCCF82302F008448D41D131918AB51E10EA53
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bf6a21963826ce75611d27844bd705badd4c7b9af6fc23b4a5c72a4539958b95
                                                                                        • Instruction ID: 699b59e6e26736c79934f290aed7d1f6ffdb53f694bd1a3efbf860b775b866ad
                                                                                        • Opcode Fuzzy Hash: bf6a21963826ce75611d27844bd705badd4c7b9af6fc23b4a5c72a4539958b95
                                                                                        • Instruction Fuzzy Hash: 60D022BB2F91684ACB0141E0EFC63A87B21CF41121F6D086BC888C3581C36AC44D2020
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: af6575a4e02cc7c37bc1c45781ee99ff026fdf81f84c8331ade82784bd81cdaf
                                                                                        • Instruction ID: 80f18287bd153a3c644124fff757a227ea5e07419a851210fdb82481e4c2aee7
                                                                                        • Opcode Fuzzy Hash: af6575a4e02cc7c37bc1c45781ee99ff026fdf81f84c8331ade82784bd81cdaf
                                                                                        • Instruction Fuzzy Hash: B9C08CB002F20C8FC60026A4F90D3F03BEC1B8220AF400020E00C000B38F618014D952
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9ff6cbd2a4a15c257bfb653703231914b7dc21c9b2e63f188083dadb7b1e9c06
                                                                                        • Instruction ID: fba09b85015f72b1d392f696e7c6058277671762ef74cde8605f96012faab464
                                                                                        • Opcode Fuzzy Hash: 9ff6cbd2a4a15c257bfb653703231914b7dc21c9b2e63f188083dadb7b1e9c06
                                                                                        • Instruction Fuzzy Hash: 8FC09B3562A2119BC600C744DC8287DF775EB4A304B25D145D81D47743C733E803C5C5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3e0d62f94001af9816eab21098f1989bf2cb28000ff4701c7055d74e8ae80bb9
                                                                                        • Instruction ID: cb456254f4e11a93bd133f28c63013e6f9e99e7e23b963c01a67334a84d79413
                                                                                        • Opcode Fuzzy Hash: 3e0d62f94001af9816eab21098f1989bf2cb28000ff4701c7055d74e8ae80bb9
                                                                                        • Instruction Fuzzy Hash: 3EC048B8929258CF8B20CFB0A80949EBAB0BA2A305B201A29E413A3202DB304601CE10
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: TJbq$Te]q$paq$xb`q
                                                                                        • API String ID: 0-4160082283
                                                                                        • Opcode ID: a8f6430a15c6baad9c410133109d3f9748acb3e6dd63035f4f6f2fc927faea19
                                                                                        • Instruction ID: b4561741a1e1e7b005b870f30ce7704bd01976b01e11ef804189fefb7c817c04
                                                                                        • Opcode Fuzzy Hash: a8f6430a15c6baad9c410133109d3f9748acb3e6dd63035f4f6f2fc927faea19
                                                                                        • Instruction Fuzzy Hash: B5B2C475E00628CFDB65CF69C984AD9BBB2FF89304F1581E5D509AB225DB31AE81CF40
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q
                                                                                        • API String ID: 0-1259897404
                                                                                        • Opcode ID: 6c2a44427e989311fe814265a2ce206ce1cb9e0abae8ff5d6cdb0983068ea9ca
                                                                                        • Instruction ID: f8c36d251526ed621ae84b895614cc922aa13203eaf8ecaa50187f24775b8082
                                                                                        • Opcode Fuzzy Hash: 6c2a44427e989311fe814265a2ce206ce1cb9e0abae8ff5d6cdb0983068ea9ca
                                                                                        • Instruction Fuzzy Hash: 38611A70A142498FD708EF6AE995B9EBFF2BF88304F14C569D0149B2A9EF345909CB50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q
                                                                                        • API String ID: 0-1259897404
                                                                                        • Opcode ID: 3fe324e4f5dad62646544fce1c3cd7967f8ba271aea4eed09c44e6d4c75e4af2
                                                                                        • Instruction ID: 972c92a6d06f9e28f0f1933136b1c4c0c47ff532cb7001daaa20a10d25cbe528
                                                                                        • Opcode Fuzzy Hash: 3fe324e4f5dad62646544fce1c3cd7967f8ba271aea4eed09c44e6d4c75e4af2
                                                                                        • Instruction Fuzzy Hash: 2A613B70A142498FD70CEF6AE995B9EBFF2BF84304F14C469E0149B2A9EF346905CB50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4ea0875f4d7d282bf262524f90138531709b42f35a243274259403945ad6495b
                                                                                        • Instruction ID: bc715cf7e4ce024f5ac3c4fb04ca984552a2c88cad9181bf5a5705077c24cbf8
                                                                                        • Opcode Fuzzy Hash: 4ea0875f4d7d282bf262524f90138531709b42f35a243274259403945ad6495b
                                                                                        • Instruction Fuzzy Hash: 71D1CF30B007048FDB95DB79C860BAE77FAAF89704F149469D14ACF291DB35E901C761
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2037533820.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_2bd0000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f78630ec2178bb2856606663890ead9044a0977fb93176c72d7ebb0aa19f7b3d
                                                                                        • Instruction ID: d7237d7d2520e88cfa39bc70440a3960f61d47e4c6eadf9e6de58f32fc518c08
                                                                                        • Opcode Fuzzy Hash: f78630ec2178bb2856606663890ead9044a0977fb93176c72d7ebb0aa19f7b3d
                                                                                        • Instruction Fuzzy Hash: 5512B5B0405F468AD730CF25FC4C9993BB1BBA5328B904609C261AB3F9E7B5154BDF64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5a89af7beb96117cbeb02a09dee0df6345426b53fe3b22a22e04201e6e9332c5
                                                                                        • Instruction ID: 3bf8170b2d60565f12520fcf299e4dfd621ff7a020640aa7129fc4847264ebdf
                                                                                        • Opcode Fuzzy Hash: 5a89af7beb96117cbeb02a09dee0df6345426b53fe3b22a22e04201e6e9332c5
                                                                                        • Instruction Fuzzy Hash: 23E1F6B4E002598FCB14DFA9C5809AEBBF2BF89305F249169D414AB356D731AD41CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 73a3da2cbb919a77f3bda2db98e81901e8b31fd2956164dad0916edebdc1f6b8
                                                                                        • Instruction ID: c538d254facba2b99c39f2c58732a8f20c4df3f449464c1426655e71856411bb
                                                                                        • Opcode Fuzzy Hash: 73a3da2cbb919a77f3bda2db98e81901e8b31fd2956164dad0916edebdc1f6b8
                                                                                        • Instruction Fuzzy Hash: CFE10774E002598FCB14DFA9C580AAEFBB2FF89305F249169D414AB356D730AD41DFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 63661cefe96a5326f65ba76313c165cb7eb804adc676154786705ac685479629
                                                                                        • Instruction ID: be3d4af028bb42b2f5f57e710f61557312d94e17635bb38b460e6ac77790affa
                                                                                        • Opcode Fuzzy Hash: 63661cefe96a5326f65ba76313c165cb7eb804adc676154786705ac685479629
                                                                                        • Instruction Fuzzy Hash: 43E129B4E102598FCB14DFA8C5809AEFBB2FF89305F248169D415AB356D730AD42CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9971199b121d1f9966e65dfdd7682381f30ee36adc7ae5d012abae3dc64d69b9
                                                                                        • Instruction ID: eec408cca98d566516828f309e4bf4c97bd85c66fd6e08eb371772fa7e77186c
                                                                                        • Opcode Fuzzy Hash: 9971199b121d1f9966e65dfdd7682381f30ee36adc7ae5d012abae3dc64d69b9
                                                                                        • Instruction Fuzzy Hash: 3BE10774E002598FCB14DFA9C580AAEFBB2FF89305F249169D414AB356D730AD42CF61
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 32b6730ef6225eb7f56537b216fde9ad31980a677397c0b34e457ddec779e693
                                                                                        • Instruction ID: 119d5d40f487f1cb7d72a9391df4909b8c82a7b8d03090188d7a3e82663b1e94
                                                                                        • Opcode Fuzzy Hash: 32b6730ef6225eb7f56537b216fde9ad31980a677397c0b34e457ddec779e693
                                                                                        • Instruction Fuzzy Hash: 76E10774E002598FDB14DFA9C580AAEFBB2FF89305F249169D414AB35AD730AD41CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2036632517.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_d00000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5ab663a3d7de5f3de02f92e840911d9e9fea2cf8213f257ec95b7d48308b10bc
                                                                                        • Instruction ID: e0298f0b47cc1254bf02bf6cab946d357628719d4ad766a4eb8fe46cd1b80524
                                                                                        • Opcode Fuzzy Hash: 5ab663a3d7de5f3de02f92e840911d9e9fea2cf8213f257ec95b7d48308b10bc
                                                                                        • Instruction Fuzzy Hash: BCA13032E10215CFCF15DFB5C84469EB7B2FF84300B25857AE909AB2A1DB71D956CB60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b3dbb03ced2df9c107da87da0fd372d896967056219bd134de0c08f5c719f540
                                                                                        • Instruction ID: 1d670088b3205f5524c3848a431c5fb585e237cb6c0889e5b959cccdbc6eb8a6
                                                                                        • Opcode Fuzzy Hash: b3dbb03ced2df9c107da87da0fd372d896967056219bd134de0c08f5c719f540
                                                                                        • Instruction Fuzzy Hash: 72D11531C2079A8ACB11EF64D994A9DB775FFD5300F11879AE00977265EB70AAC8CF81
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2037533820.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BD0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_2bd0000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1c5f70fcbb934675eb8ca7b5fe9b0b321269eec98652e12f68fd60ef5739347d
                                                                                        • Instruction ID: 67620caa5ba277b453833629682a8120a1823ce0d24ecb5a6ff5802be65e3639
                                                                                        • Opcode Fuzzy Hash: 1c5f70fcbb934675eb8ca7b5fe9b0b321269eec98652e12f68fd60ef5739347d
                                                                                        • Instruction Fuzzy Hash: E5D147B0805B468FD721CF25FC489993BB1BBA5328F514609D261AB3F9EBB4144BDF60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 25648776c8a5c8d4adb29b9f2c165eba4ea3f3ae65bb58b8edf00f8d8d67cd1c
                                                                                        • Instruction ID: 234eaa2da942ee47bf0b52b7ca79763d063e6a966645d51c5c3440f29f7ab8a3
                                                                                        • Opcode Fuzzy Hash: 25648776c8a5c8d4adb29b9f2c165eba4ea3f3ae65bb58b8edf00f8d8d67cd1c
                                                                                        • Instruction Fuzzy Hash: 3951D6B4E051199FCB04DFAAD9809AEFBF2BF88301F14C565E418A7355DB30A942CF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2041593765.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6e10000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8bae4d32ee114f1b1d700fb751fff081166d68d1b7bd0cfd1f0957e29405851a
                                                                                        • Instruction ID: 510f676bff9fffd9042c9e1ab8a43dff7f2b8a68b29c123b0d380f80f8971e0a
                                                                                        • Opcode Fuzzy Hash: 8bae4d32ee114f1b1d700fb751fff081166d68d1b7bd0cfd1f0957e29405851a
                                                                                        • Instruction Fuzzy Hash: C3511A74E002598FDB14DFA9C5805AEFBF2BF89305F24C16AD418AB356D730A942CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a6480ba63803b03b1f83cc4c5ee8e8dadb1bb1e962b64b40dee504e0e1adf09c
                                                                                        • Instruction ID: 87250916864f10afefa783bf84a2ad97abaeab1c5bb905217060e273fa1e3b6d
                                                                                        • Opcode Fuzzy Hash: a6480ba63803b03b1f83cc4c5ee8e8dadb1bb1e962b64b40dee504e0e1adf09c
                                                                                        • Instruction Fuzzy Hash: 4C5193B5D016188FEB68CF2AD944799BAF3AFC8200F14C5EAD40DA7264DF754A95CF00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2042664135.0000000007A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A70000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_7a70000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c7ab37390bc7511ca9c24247795a3c013749edb6c8b7f378331f09c313879f0b
                                                                                        • Instruction ID: 28a28b1cfad318662df2fd64dc710051a66213c2e3cfb98a54f06e04f2349810
                                                                                        • Opcode Fuzzy Hash: c7ab37390bc7511ca9c24247795a3c013749edb6c8b7f378331f09c313879f0b
                                                                                        • Instruction Fuzzy Hash: 193158B1D016588BEB68CF6BDD4479EFAF3AFC8304F18C1AAC41CAA254DB7509958F01
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:2.6%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:2.6%
                                                                                        Total number of Nodes:1668
                                                                                        Total number of Limit Nodes:5
                                                                                        execution_graph 6510 10008640 6513 10008657 6510->6513 6514 10008665 6513->6514 6515 10008679 6513->6515 6518 10006368 _free 20 API calls 6514->6518 6516 10008681 6515->6516 6517 10008693 6515->6517 6520 10006368 _free 20 API calls 6516->6520 6524 10008652 6517->6524 6526 100054a7 6517->6526 6519 1000866a 6518->6519 6521 100062ac ___std_exception_copy 26 API calls 6519->6521 6522 10008686 6520->6522 6521->6524 6525 100062ac ___std_exception_copy 26 API calls 6522->6525 6525->6524 6527 100054ba 6526->6527 6528 100054c4 6526->6528 6527->6524 6528->6527 6529 10005af6 _abort 38 API calls 6528->6529 6530 100054e5 6529->6530 6534 10007a00 6530->6534 6535 10007a13 6534->6535 6536 100054fe 6534->6536 6535->6536 6542 10007f0f 6535->6542 6538 10007a2d 6536->6538 6539 10007a40 6538->6539 6540 10007a55 6538->6540 6539->6540 6677 10006d7e 6539->6677 6540->6527 6543 10007f1b ___scrt_is_nonwritable_in_current_image 6542->6543 6544 10005af6 _abort 38 API calls 6543->6544 6545 10007f24 6544->6545 6546 10007f72 _abort 6545->6546 6554 10005671 RtlEnterCriticalSection 6545->6554 6546->6536 6548 10007f42 6555 10007f86 6548->6555 6553 100055a8 _abort 38 API calls 6553->6546 6554->6548 6556 10007f56 6555->6556 6557 10007f94 __fassign 6555->6557 6559 10007f75 6556->6559 6557->6556 6562 10007cc2 6557->6562 6676 100056b9 RtlLeaveCriticalSection 6559->6676 6561 10007f69 6561->6546 6561->6553 6563 10007d42 6562->6563 6566 10007cd8 6562->6566 6564 10007d90 6563->6564 6567 1000571e _free 20 API calls 6563->6567 6630 10007e35 6564->6630 6566->6563 6568 10007d0b 6566->6568 6573 1000571e _free 20 API calls 6566->6573 6569 10007d64 6567->6569 6570 10007d2d 6568->6570 6575 1000571e _free 20 API calls 6568->6575 6571 1000571e _free 20 API calls 6569->6571 6572 1000571e _free 20 API calls 6570->6572 6574 10007d77 6571->6574 6577 10007d37 6572->6577 6579 10007d00 6573->6579 6576 1000571e _free 20 API calls 6574->6576 6581 10007d22 6575->6581 6582 10007d85 6576->6582 6583 1000571e _free 20 API calls 6577->6583 6578 10007dfe 6584 1000571e _free 20 API calls 6578->6584 6590 100090ba 6579->6590 6580 10007d9e 6580->6578 6588 1000571e 20 API calls _free 6580->6588 6618 100091b8 6581->6618 6587 1000571e _free 20 API calls 6582->6587 6583->6563 6589 10007e04 6584->6589 6587->6564 6588->6580 6589->6556 6591 100090cb 6590->6591 6617 100091b4 6590->6617 6592 100090dc 6591->6592 6593 1000571e _free 20 API calls 6591->6593 6594 100090ee 6592->6594 6596 1000571e _free 20 API calls 6592->6596 6593->6592 6595 10009100 6594->6595 6597 1000571e _free 20 API calls 6594->6597 6598 10009112 6595->6598 6599 1000571e _free 20 API calls 6595->6599 6596->6594 6597->6595 6600 10009124 6598->6600 6601 1000571e _free 20 API calls 6598->6601 6599->6598 6602 10009136 6600->6602 6604 1000571e _free 20 API calls 6600->6604 6601->6600 6603 10009148 6602->6603 6605 1000571e _free 20 API calls 6602->6605 6606 1000915a 6603->6606 6607 1000571e _free 20 API calls 6603->6607 6604->6602 6605->6603 6608 1000571e _free 20 API calls 6606->6608 6611 1000916c 6606->6611 6607->6606 6608->6611 6609 10009190 6614 100091a2 6609->6614 6615 1000571e _free 20 API calls 6609->6615 6610 1000917e 6610->6609 6613 1000571e _free 20 API calls 6610->6613 6611->6610 6612 1000571e _free 20 API calls 6611->6612 6612->6610 6613->6609 6616 1000571e _free 20 API calls 6614->6616 6614->6617 6615->6614 6616->6617 6617->6568 6619 100091c5 6618->6619 6629 1000921d 6618->6629 6620 1000571e _free 20 API calls 6619->6620 6621 100091d5 6619->6621 6620->6621 6622 100091e7 6621->6622 6623 1000571e _free 20 API calls 6621->6623 6624 100091f9 6622->6624 6626 1000571e _free 20 API calls 6622->6626 6623->6622 6625 1000920b 6624->6625 6627 1000571e _free 20 API calls 6624->6627 6628 1000571e _free 20 API calls 6625->6628 6625->6629 6626->6624 6627->6625 6628->6629 6629->6570 6631 10007e60 6630->6631 6632 10007e42 6630->6632 6631->6580 6632->6631 6636 1000925d 6632->6636 6635 1000571e _free 20 API calls 6635->6631 6637 10007e5a 6636->6637 6638 1000926e 6636->6638 6637->6635 6672 10009221 6638->6672 6641 10009221 __fassign 20 API calls 6642 10009281 6641->6642 6643 10009221 __fassign 20 API calls 6642->6643 6644 1000928c 6643->6644 6645 10009221 __fassign 20 API calls 6644->6645 6646 10009297 6645->6646 6647 10009221 __fassign 20 API calls 6646->6647 6648 100092a5 6647->6648 6649 1000571e _free 20 API calls 6648->6649 6650 100092b0 6649->6650 6651 1000571e _free 20 API calls 6650->6651 6652 100092bb 6651->6652 6653 1000571e _free 20 API calls 6652->6653 6654 100092c6 6653->6654 6655 10009221 __fassign 20 API calls 6654->6655 6656 100092d4 6655->6656 6657 10009221 __fassign 20 API calls 6656->6657 6658 100092e2 6657->6658 6659 10009221 __fassign 20 API calls 6658->6659 6660 100092f3 6659->6660 6661 10009221 __fassign 20 API calls 6660->6661 6662 10009301 6661->6662 6663 10009221 __fassign 20 API calls 6662->6663 6664 1000930f 6663->6664 6665 1000571e _free 20 API calls 6664->6665 6666 1000931a 6665->6666 6667 1000571e _free 20 API calls 6666->6667 6668 10009325 6667->6668 6669 1000571e _free 20 API calls 6668->6669 6670 10009330 6669->6670 6671 1000571e _free 20 API calls 6670->6671 6671->6637 6673 10009258 6672->6673 6674 10009248 6672->6674 6673->6641 6674->6673 6675 1000571e _free 20 API calls 6674->6675 6675->6674 6676->6561 6678 10006d8a ___scrt_is_nonwritable_in_current_image 6677->6678 6679 10005af6 _abort 38 API calls 6678->6679 6681 10006d94 6679->6681 6682 10006e18 _abort 6681->6682 6683 100055a8 _abort 38 API calls 6681->6683 6685 1000571e _free 20 API calls 6681->6685 6686 10005671 RtlEnterCriticalSection 6681->6686 6687 10006e0f 6681->6687 6682->6540 6683->6681 6685->6681 6686->6681 6690 100056b9 RtlLeaveCriticalSection 6687->6690 6689 10006e16 6689->6681 6690->6689 7257 10007a80 7258 10007a8d 7257->7258 7259 1000637b __dosmaperr 20 API calls 7258->7259 7260 10007aa7 7259->7260 7261 1000571e _free 20 API calls 7260->7261 7262 10007ab3 7261->7262 7263 1000637b __dosmaperr 20 API calls 7262->7263 7266 10007ad9 7262->7266 7265 10007acd 7263->7265 7264 10005eb7 11 API calls 7264->7266 7267 1000571e _free 20 API calls 7265->7267 7266->7264 7268 10007ae5 7266->7268 7267->7266 6082 10007103 GetCommandLineA GetCommandLineW 6083 10005303 6086 100050a5 6083->6086 6095 1000502f 6086->6095 6089 1000502f 5 API calls 6090 100050c3 6089->6090 6099 10005000 6090->6099 6093 10005000 20 API calls 6094 100050d9 6093->6094 6096 10005048 6095->6096 6097 10002ada _ValidateLocalCookies 5 API calls 6096->6097 6098 10005069 6097->6098 6098->6089 6100 1000502a 6099->6100 6101 1000500d 6099->6101 6100->6093 6102 10005024 6101->6102 6103 1000571e _free 20 API calls 6101->6103 6104 1000571e _free 20 API calls 6102->6104 6103->6101 6104->6100 6691 1000af43 6692 1000af59 6691->6692 6693 1000af4d 6691->6693 6693->6692 6694 1000af52 CloseHandle 6693->6694 6694->6692 6695 1000a945 6696 1000a96d 6695->6696 6697 1000a9a5 6696->6697 6698 1000a997 6696->6698 6699 1000a99e 6696->6699 6704 1000aa17 6698->6704 6708 1000aa00 6699->6708 6705 1000aa20 6704->6705 6712 1000b19b 6705->6712 6709 1000aa20 6708->6709 6710 1000b19b __startOneArgErrorHandling 21 API calls 6709->6710 6711 1000a9a3 6710->6711 6713 1000b1da __startOneArgErrorHandling 6712->6713 6715 1000b25c __startOneArgErrorHandling 6713->6715 6722 1000b59e 6713->6722 6720 1000b286 6715->6720 6725 100078a3 6715->6725 6717 1000b292 6719 10002ada _ValidateLocalCookies 5 API calls 6717->6719 6721 1000a99c 6719->6721 6720->6717 6729 1000b8b2 6720->6729 6736 1000b5c1 6722->6736 6726 100078cb 6725->6726 6727 10002ada _ValidateLocalCookies 5 API calls 6726->6727 6728 100078e8 6727->6728 6728->6720 6730 1000b8d4 6729->6730 6731 1000b8bf 6729->6731 6733 10006368 _free 20 API calls 6730->6733 6732 1000b8d9 6731->6732 6734 10006368 _free 20 API calls 6731->6734 6732->6717 6733->6732 6735 1000b8cc 6734->6735 6735->6717 6737 1000b5ec __raise_exc 6736->6737 6738 1000b7e5 RaiseException 6737->6738 6739 1000b5bc 6738->6739 6739->6715 7520 1000a1c6 IsProcessorFeaturePresent 7521 10007bc7 7522 10007bd3 ___scrt_is_nonwritable_in_current_image 7521->7522 7523 10007c0a _abort 7522->7523 7529 10005671 RtlEnterCriticalSection 7522->7529 7525 10007be7 7526 10007f86 __fassign 20 API calls 7525->7526 7527 10007bf7 7526->7527 7530 10007c10 7527->7530 7529->7525 7533 100056b9 RtlLeaveCriticalSection 7530->7533 7532 10007c17 7532->7523 7533->7532 6740 10005348 6741 10003529 ___vcrt_uninitialize 8 API calls 6740->6741 6742 1000534f 6741->6742 6743 10007b48 6753 10008ebf 6743->6753 6747 10007b55 6766 1000907c 6747->6766 6750 10007b7f 6751 1000571e _free 20 API calls 6750->6751 6752 10007b8a 6751->6752 6770 10008ec8 6753->6770 6755 10007b50 6756 10008fdc 6755->6756 6757 10008fe8 ___scrt_is_nonwritable_in_current_image 6756->6757 6790 10005671 RtlEnterCriticalSection 6757->6790 6759 1000905e 6804 10009073 6759->6804 6761 10009032 RtlDeleteCriticalSection 6764 1000571e _free 20 API calls 6761->6764 6762 1000906a _abort 6762->6747 6765 10008ff3 6764->6765 6765->6759 6765->6761 6791 1000a09c 6765->6791 6767 10009092 6766->6767 6768 10007b64 RtlDeleteCriticalSection 6766->6768 6767->6768 6769 1000571e _free 20 API calls 6767->6769 6768->6747 6768->6750 6769->6768 6771 10008ed4 ___scrt_is_nonwritable_in_current_image 6770->6771 6780 10005671 RtlEnterCriticalSection 6771->6780 6773 10008f77 6785 10008f97 6773->6785 6776 10008f83 _abort 6776->6755 6778 10008e78 66 API calls 6779 10008ee3 6778->6779 6779->6773 6779->6778 6781 10007b94 RtlEnterCriticalSection 6779->6781 6782 10008f6d 6779->6782 6780->6779 6781->6779 6788 10007ba8 RtlLeaveCriticalSection 6782->6788 6784 10008f75 6784->6779 6789 100056b9 RtlLeaveCriticalSection 6785->6789 6787 10008f9e 6787->6776 6788->6784 6789->6787 6790->6765 6792 1000a0a8 ___scrt_is_nonwritable_in_current_image 6791->6792 6793 1000a0b9 6792->6793 6794 1000a0ce 6792->6794 6795 10006368 _free 20 API calls 6793->6795 6803 1000a0c9 _abort 6794->6803 6807 10007b94 RtlEnterCriticalSection 6794->6807 6797 1000a0be 6795->6797 6799 100062ac ___std_exception_copy 26 API calls 6797->6799 6798 1000a0ea 6808 1000a026 6798->6808 6799->6803 6801 1000a0f5 6824 1000a112 6801->6824 6803->6765 7072 100056b9 RtlLeaveCriticalSection 6804->7072 6806 1000907a 6806->6762 6807->6798 6809 1000a033 6808->6809 6810 1000a048 6808->6810 6811 10006368 _free 20 API calls 6809->6811 6816 1000a043 6810->6816 6827 10008e12 6810->6827 6812 1000a038 6811->6812 6814 100062ac ___std_exception_copy 26 API calls 6812->6814 6814->6816 6816->6801 6817 1000907c 20 API calls 6818 1000a064 6817->6818 6833 10007a5a 6818->6833 6820 1000a06a 6840 1000adce 6820->6840 6823 1000571e _free 20 API calls 6823->6816 7071 10007ba8 RtlLeaveCriticalSection 6824->7071 6826 1000a11a 6826->6803 6828 10008e2a 6827->6828 6829 10008e26 6827->6829 6828->6829 6830 10007a5a 26 API calls 6828->6830 6829->6817 6831 10008e4a 6830->6831 6855 10009a22 6831->6855 6834 10007a66 6833->6834 6835 10007a7b 6833->6835 6836 10006368 _free 20 API calls 6834->6836 6835->6820 6837 10007a6b 6836->6837 6838 100062ac ___std_exception_copy 26 API calls 6837->6838 6839 10007a76 6838->6839 6839->6820 6841 1000adf2 6840->6841 6842 1000addd 6840->6842 6843 1000ae2d 6841->6843 6848 1000ae19 6841->6848 6844 10006355 __dosmaperr 20 API calls 6842->6844 6845 10006355 __dosmaperr 20 API calls 6843->6845 6846 1000ade2 6844->6846 6849 1000ae32 6845->6849 6847 10006368 _free 20 API calls 6846->6847 6852 1000a070 6847->6852 7028 1000ada6 6848->7028 6851 10006368 _free 20 API calls 6849->6851 6853 1000ae3a 6851->6853 6852->6816 6852->6823 6854 100062ac ___std_exception_copy 26 API calls 6853->6854 6854->6852 6856 10009a2e ___scrt_is_nonwritable_in_current_image 6855->6856 6857 10009a36 6856->6857 6858 10009a4e 6856->6858 6880 10006355 6857->6880 6860 10009aec 6858->6860 6864 10009a83 6858->6864 6862 10006355 __dosmaperr 20 API calls 6860->6862 6865 10009af1 6862->6865 6863 10006368 _free 20 API calls 6866 10009a43 _abort 6863->6866 6883 10008c7b RtlEnterCriticalSection 6864->6883 6868 10006368 _free 20 API calls 6865->6868 6866->6829 6870 10009af9 6868->6870 6869 10009a89 6871 10009aa5 6869->6871 6872 10009aba 6869->6872 6873 100062ac ___std_exception_copy 26 API calls 6870->6873 6874 10006368 _free 20 API calls 6871->6874 6884 10009b0d 6872->6884 6873->6866 6876 10009aaa 6874->6876 6878 10006355 __dosmaperr 20 API calls 6876->6878 6877 10009ab5 6935 10009ae4 6877->6935 6878->6877 6881 10005b7a __dosmaperr 20 API calls 6880->6881 6882 1000635a 6881->6882 6882->6863 6883->6869 6885 10009b34 6884->6885 6886 10009b3b 6884->6886 6889 10002ada _ValidateLocalCookies 5 API calls 6885->6889 6887 10009b5e 6886->6887 6888 10009b3f 6886->6888 6891 10009baf 6887->6891 6892 10009b92 6887->6892 6890 10006355 __dosmaperr 20 API calls 6888->6890 6893 10009d15 6889->6893 6894 10009b44 6890->6894 6896 10009bc5 6891->6896 6938 1000a00b 6891->6938 6895 10006355 __dosmaperr 20 API calls 6892->6895 6893->6877 6897 10006368 _free 20 API calls 6894->6897 6899 10009b97 6895->6899 6941 100096b2 6896->6941 6901 10009b4b 6897->6901 6904 10006368 _free 20 API calls 6899->6904 6902 100062ac ___std_exception_copy 26 API calls 6901->6902 6902->6885 6907 10009b9f 6904->6907 6905 10009bd3 6908 10009bf9 6905->6908 6913 10009bd7 6905->6913 6906 10009c0c 6910 10009c20 6906->6910 6911 10009c66 WriteFile 6906->6911 6909 100062ac ___std_exception_copy 26 API calls 6907->6909 6953 10009492 GetConsoleCP 6908->6953 6909->6885 6916 10009c56 6910->6916 6917 10009c28 6910->6917 6915 10009c89 GetLastError 6911->6915 6922 10009bef 6911->6922 6912 10009ccd 6912->6885 6924 10006368 _free 20 API calls 6912->6924 6913->6912 6948 10009645 6913->6948 6915->6922 6979 10009728 6916->6979 6918 10009c46 6917->6918 6919 10009c2d 6917->6919 6971 100098f5 6918->6971 6919->6912 6964 10009807 6919->6964 6922->6885 6922->6912 6927 10009ca9 6922->6927 6926 10009cf2 6924->6926 6930 10006355 __dosmaperr 20 API calls 6926->6930 6928 10009cb0 6927->6928 6929 10009cc4 6927->6929 6931 10006368 _free 20 API calls 6928->6931 6986 10006332 6929->6986 6930->6885 6933 10009cb5 6931->6933 6934 10006355 __dosmaperr 20 API calls 6933->6934 6934->6885 7027 10008c9e RtlLeaveCriticalSection 6935->7027 6937 10009aea 6937->6866 6991 10009f8d 6938->6991 7013 10008dbc 6941->7013 6943 100096c2 6944 100096c7 6943->6944 6945 10005af6 _abort 38 API calls 6943->6945 6944->6905 6944->6906 6946 100096ea 6945->6946 6946->6944 6947 10009708 GetConsoleMode 6946->6947 6947->6944 6951 1000966a 6948->6951 6952 1000969f 6948->6952 6949 1000a181 WriteConsoleW CreateFileW 6949->6951 6950 100096a1 GetLastError 6950->6952 6951->6949 6951->6950 6951->6952 6952->6922 6957 100094f5 6953->6957 6963 10009607 6953->6963 6954 10002ada _ValidateLocalCookies 5 API calls 6955 10009641 6954->6955 6955->6922 6958 1000957b WideCharToMultiByte 6957->6958 6960 100079e6 40 API calls __fassign 6957->6960 6962 100095d2 WriteFile 6957->6962 6957->6963 7022 10007c19 6957->7022 6959 100095a1 WriteFile 6958->6959 6958->6963 6959->6957 6961 1000962a GetLastError 6959->6961 6960->6957 6961->6963 6962->6957 6962->6961 6963->6954 6966 10009816 6964->6966 6965 100098d8 6968 10002ada _ValidateLocalCookies 5 API calls 6965->6968 6966->6965 6967 10009894 WriteFile 6966->6967 6967->6966 6969 100098da GetLastError 6967->6969 6970 100098f1 6968->6970 6969->6965 6970->6922 6978 10009904 6971->6978 6972 10009a0f 6973 10002ada _ValidateLocalCookies 5 API calls 6972->6973 6975 10009a1e 6973->6975 6974 10009986 WideCharToMultiByte 6976 10009a07 GetLastError 6974->6976 6977 100099bb WriteFile 6974->6977 6975->6922 6976->6972 6977->6976 6977->6978 6978->6972 6978->6974 6978->6977 6984 10009737 6979->6984 6980 100097ea 6981 10002ada _ValidateLocalCookies 5 API calls 6980->6981 6983 10009803 6981->6983 6982 100097a9 WriteFile 6982->6984 6985 100097ec GetLastError 6982->6985 6983->6922 6984->6980 6984->6982 6985->6980 6987 10006355 __dosmaperr 20 API calls 6986->6987 6988 1000633d _free 6987->6988 6989 10006368 _free 20 API calls 6988->6989 6990 10006350 6989->6990 6990->6885 7000 10008d52 6991->7000 6993 10009f9f 6994 10009fa7 6993->6994 6995 10009fb8 SetFilePointerEx 6993->6995 6996 10006368 _free 20 API calls 6994->6996 6997 10009fd0 GetLastError 6995->6997 6998 10009fac 6995->6998 6996->6998 6999 10006332 __dosmaperr 20 API calls 6997->6999 6998->6896 6999->6998 7001 10008d74 7000->7001 7002 10008d5f 7000->7002 7005 10006355 __dosmaperr 20 API calls 7001->7005 7007 10008d99 7001->7007 7003 10006355 __dosmaperr 20 API calls 7002->7003 7004 10008d64 7003->7004 7006 10006368 _free 20 API calls 7004->7006 7008 10008da4 7005->7008 7009 10008d6c 7006->7009 7007->6993 7010 10006368 _free 20 API calls 7008->7010 7009->6993 7011 10008dac 7010->7011 7012 100062ac ___std_exception_copy 26 API calls 7011->7012 7012->7009 7014 10008dd6 7013->7014 7015 10008dc9 7013->7015 7017 10008de2 7014->7017 7018 10006368 _free 20 API calls 7014->7018 7016 10006368 _free 20 API calls 7015->7016 7019 10008dce 7016->7019 7017->6943 7020 10008e03 7018->7020 7019->6943 7021 100062ac ___std_exception_copy 26 API calls 7020->7021 7021->7019 7023 10005af6 _abort 38 API calls 7022->7023 7024 10007c24 7023->7024 7025 10007a00 __fassign 38 API calls 7024->7025 7026 10007c34 7025->7026 7026->6957 7027->6937 7031 1000ad24 7028->7031 7030 1000adca 7030->6852 7032 1000ad30 ___scrt_is_nonwritable_in_current_image 7031->7032 7042 10008c7b RtlEnterCriticalSection 7032->7042 7034 1000ad3e 7035 1000ad70 7034->7035 7036 1000ad65 7034->7036 7038 10006368 _free 20 API calls 7035->7038 7043 1000ae4d 7036->7043 7039 1000ad6b 7038->7039 7058 1000ad9a 7039->7058 7041 1000ad8d _abort 7041->7030 7042->7034 7044 10008d52 26 API calls 7043->7044 7046 1000ae5d 7044->7046 7045 1000ae63 7061 10008cc1 7045->7061 7046->7045 7048 1000ae95 7046->7048 7051 10008d52 26 API calls 7046->7051 7048->7045 7049 10008d52 26 API calls 7048->7049 7052 1000aea1 CloseHandle 7049->7052 7054 1000ae8c 7051->7054 7052->7045 7056 1000aead GetLastError 7052->7056 7053 1000aedd 7053->7039 7055 10008d52 26 API calls 7054->7055 7055->7048 7056->7045 7057 10006332 __dosmaperr 20 API calls 7057->7053 7070 10008c9e RtlLeaveCriticalSection 7058->7070 7060 1000ada4 7060->7041 7062 10008cd0 7061->7062 7063 10008d37 7061->7063 7062->7063 7068 10008cfa 7062->7068 7064 10006368 _free 20 API calls 7063->7064 7065 10008d3c 7064->7065 7066 10006355 __dosmaperr 20 API calls 7065->7066 7067 10008d27 7066->7067 7067->7053 7067->7057 7068->7067 7069 10008d21 SetStdHandle 7068->7069 7069->7067 7070->7060 7071->6826 7072->6806 7073 10002049 7074 10002055 ___scrt_is_nonwritable_in_current_image 7073->7074 7075 100020d3 7074->7075 7076 1000207d 7074->7076 7086 1000205e 7074->7086 7077 10002639 ___scrt_fastfail 4 API calls 7075->7077 7087 1000244c 7076->7087 7079 100020da 7077->7079 7080 10002082 7096 10002308 7080->7096 7082 10002087 __RTC_Initialize 7099 100020c4 7082->7099 7084 1000209f 7102 1000260b 7084->7102 7088 10002451 ___scrt_release_startup_lock 7087->7088 7089 10002461 7088->7089 7090 10002455 7088->7090 7093 1000246e 7089->7093 7094 1000499b _abort 28 API calls 7089->7094 7091 1000527a _abort 20 API calls 7090->7091 7092 1000245f 7091->7092 7092->7080 7093->7080 7095 10004bbd 7094->7095 7095->7080 7108 100034c7 RtlInterlockedFlushSList 7096->7108 7098 10002312 7098->7082 7110 1000246f 7099->7110 7101 100020c9 ___scrt_release_startup_lock 7101->7084 7103 10002617 7102->7103 7104 1000262d 7103->7104 7129 100053ed 7103->7129 7104->7086 7107 10003529 ___vcrt_uninitialize 8 API calls 7107->7104 7109 100034d7 7108->7109 7109->7098 7115 100053ff 7110->7115 7113 1000391b ___vcrt_uninitialize_ptd 6 API calls 7114 1000354d 7113->7114 7114->7101 7118 10005c2b 7115->7118 7119 10005c35 7118->7119 7121 10002476 7118->7121 7122 10005db2 7119->7122 7121->7113 7123 10005c45 __dosmaperr 5 API calls 7122->7123 7124 10005dd9 7123->7124 7125 10005df1 TlsFree 7124->7125 7126 10005de5 7124->7126 7125->7126 7127 10002ada _ValidateLocalCookies 5 API calls 7126->7127 7128 10005e02 7127->7128 7128->7121 7132 100074da 7129->7132 7135 100074f3 7132->7135 7133 10002ada _ValidateLocalCookies 5 API calls 7134 10002625 7133->7134 7134->7107 7135->7133 7269 10008a89 7272 10006d60 7269->7272 7273 10006d69 7272->7273 7274 10006d72 7272->7274 7276 10006c5f 7273->7276 7277 10005af6 _abort 38 API calls 7276->7277 7278 10006c6c 7277->7278 7279 10006d7e __fassign 38 API calls 7278->7279 7280 10006c74 7279->7280 7296 100069f3 7280->7296 7283 10006c8b 7283->7274 7286 10006cce 7289 1000571e _free 20 API calls 7286->7289 7289->7283 7290 10006cc9 7291 10006368 _free 20 API calls 7290->7291 7291->7286 7292 10006d12 7292->7286 7320 100068c9 7292->7320 7293 10006ce6 7293->7292 7294 1000571e _free 20 API calls 7293->7294 7294->7292 7297 100054a7 __fassign 38 API calls 7296->7297 7298 10006a05 7297->7298 7299 10006a14 GetOEMCP 7298->7299 7300 10006a26 7298->7300 7302 10006a3d 7299->7302 7301 10006a2b GetACP 7300->7301 7300->7302 7301->7302 7302->7283 7303 100056d0 7302->7303 7304 1000570e 7303->7304 7308 100056de __dosmaperr 7303->7308 7305 10006368 _free 20 API calls 7304->7305 7307 1000570c 7305->7307 7306 100056f9 RtlAllocateHeap 7306->7307 7306->7308 7307->7286 7310 10006e20 7307->7310 7308->7304 7308->7306 7309 1000474f __dosmaperr 7 API calls 7308->7309 7309->7308 7311 100069f3 40 API calls 7310->7311 7312 10006e3f 7311->7312 7315 10006e90 IsValidCodePage 7312->7315 7317 10006e46 7312->7317 7319 10006eb5 ___scrt_fastfail 7312->7319 7313 10002ada _ValidateLocalCookies 5 API calls 7314 10006cc1 7313->7314 7314->7290 7314->7293 7316 10006ea2 GetCPInfo 7315->7316 7315->7317 7316->7317 7316->7319 7317->7313 7323 10006acb GetCPInfo 7319->7323 7396 10006886 7320->7396 7322 100068ed 7322->7286 7324 10006baf 7323->7324 7330 10006b05 7323->7330 7327 10002ada _ValidateLocalCookies 5 API calls 7324->7327 7329 10006c5b 7327->7329 7329->7317 7333 100086e4 7330->7333 7332 10008a3e 43 API calls 7332->7324 7334 100054a7 __fassign 38 API calls 7333->7334 7336 10008704 MultiByteToWideChar 7334->7336 7337 10008742 7336->7337 7338 100087da 7336->7338 7340 100056d0 21 API calls 7337->7340 7343 10008763 ___scrt_fastfail 7337->7343 7339 10002ada _ValidateLocalCookies 5 API calls 7338->7339 7341 10006b66 7339->7341 7340->7343 7347 10008a3e 7341->7347 7342 100087d4 7352 10008801 7342->7352 7343->7342 7345 100087a8 MultiByteToWideChar 7343->7345 7345->7342 7346 100087c4 GetStringTypeW 7345->7346 7346->7342 7348 100054a7 __fassign 38 API calls 7347->7348 7349 10008a51 7348->7349 7356 10008821 7349->7356 7353 1000880d 7352->7353 7354 1000881e 7352->7354 7353->7354 7355 1000571e _free 20 API calls 7353->7355 7354->7338 7355->7354 7358 1000883c 7356->7358 7357 10008862 MultiByteToWideChar 7359 1000888c 7357->7359 7370 10008a16 7357->7370 7358->7357 7364 100056d0 21 API calls 7359->7364 7366 100088ad 7359->7366 7360 10002ada _ValidateLocalCookies 5 API calls 7361 10006b87 7360->7361 7361->7332 7362 100088f6 MultiByteToWideChar 7363 10008962 7362->7363 7365 1000890f 7362->7365 7368 10008801 __freea 20 API calls 7363->7368 7364->7366 7383 10005f19 7365->7383 7366->7362 7366->7363 7368->7370 7370->7360 7371 10008971 7373 100056d0 21 API calls 7371->7373 7376 10008992 7371->7376 7372 10008939 7372->7363 7374 10005f19 11 API calls 7372->7374 7373->7376 7374->7363 7375 10008a07 7378 10008801 __freea 20 API calls 7375->7378 7376->7375 7377 10005f19 11 API calls 7376->7377 7379 100089e6 7377->7379 7378->7363 7379->7375 7380 100089f5 WideCharToMultiByte 7379->7380 7380->7375 7381 10008a35 7380->7381 7382 10008801 __freea 20 API calls 7381->7382 7382->7363 7384 10005c45 __dosmaperr 5 API calls 7383->7384 7385 10005f40 7384->7385 7388 10005f49 7385->7388 7391 10005fa1 7385->7391 7389 10002ada _ValidateLocalCookies 5 API calls 7388->7389 7390 10005f9b 7389->7390 7390->7363 7390->7371 7390->7372 7392 10005c45 __dosmaperr 5 API calls 7391->7392 7393 10005fc8 7392->7393 7394 10002ada _ValidateLocalCookies 5 API calls 7393->7394 7395 10005f89 LCMapStringW 7394->7395 7395->7388 7397 10006892 ___scrt_is_nonwritable_in_current_image 7396->7397 7404 10005671 RtlEnterCriticalSection 7397->7404 7399 1000689c 7405 100068f1 7399->7405 7403 100068b5 _abort 7403->7322 7404->7399 7417 10007011 7405->7417 7407 1000693f 7408 10007011 26 API calls 7407->7408 7409 1000695b 7408->7409 7410 10007011 26 API calls 7409->7410 7411 10006979 7410->7411 7412 100068a9 7411->7412 7413 1000571e _free 20 API calls 7411->7413 7414 100068bd 7412->7414 7413->7412 7431 100056b9 RtlLeaveCriticalSection 7414->7431 7416 100068c7 7416->7403 7418 10007022 7417->7418 7427 1000701e 7417->7427 7419 10007029 7418->7419 7423 1000703c ___scrt_fastfail 7418->7423 7420 10006368 _free 20 API calls 7419->7420 7421 1000702e 7420->7421 7422 100062ac ___std_exception_copy 26 API calls 7421->7422 7422->7427 7424 10007073 7423->7424 7425 1000706a 7423->7425 7423->7427 7424->7427 7429 10006368 _free 20 API calls 7424->7429 7426 10006368 _free 20 API calls 7425->7426 7428 1000706f 7426->7428 7427->7407 7430 100062ac ___std_exception_copy 26 API calls 7428->7430 7429->7428 7430->7427 7431->7416 6105 1000220c 6106 10002215 6105->6106 6107 1000221a dllmain_dispatch 6105->6107 6109 100022b1 6106->6109 6110 100022c7 6109->6110 6112 100022d0 6110->6112 6113 10002264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6110->6113 6112->6107 6113->6112 7136 1000724e GetProcessHeap 7137 1000284f 7138 10002882 std::exception::exception 27 API calls 7137->7138 7139 1000285d 7138->7139 7436 10003c90 RtlUnwind 7534 100036d0 7535 100036e2 7534->7535 7537 100036f0 @_EH4_CallFilterFunc@8 7534->7537 7536 10002ada _ValidateLocalCookies 5 API calls 7535->7536 7536->7537 7140 10005351 7141 10005360 7140->7141 7142 10005374 7140->7142 7141->7142 7145 1000571e _free 20 API calls 7141->7145 7143 1000571e _free 20 API calls 7142->7143 7144 10005386 7143->7144 7146 1000571e _free 20 API calls 7144->7146 7145->7142 7147 10005399 7146->7147 7148 1000571e _free 20 API calls 7147->7148 7149 100053aa 7148->7149 7150 1000571e _free 20 API calls 7149->7150 7151 100053bb 7150->7151 7538 100073d5 7539 100073e1 ___scrt_is_nonwritable_in_current_image 7538->7539 7550 10005671 RtlEnterCriticalSection 7539->7550 7541 100073e8 7542 10008be3 27 API calls 7541->7542 7543 100073f7 7542->7543 7548 10007406 7543->7548 7551 10007269 GetStartupInfoW 7543->7551 7562 10007422 7548->7562 7549 10007417 _abort 7550->7541 7552 10007286 7551->7552 7553 10007318 7551->7553 7552->7553 7554 10008be3 27 API calls 7552->7554 7557 1000731f 7553->7557 7555 100072af 7554->7555 7555->7553 7556 100072dd GetFileType 7555->7556 7556->7555 7559 10007326 7557->7559 7558 10007369 GetStdHandle 7558->7559 7559->7558 7560 100073d1 7559->7560 7561 1000737c GetFileType 7559->7561 7560->7548 7561->7559 7565 100056b9 RtlLeaveCriticalSection 7562->7565 7564 10007429 7564->7549 7565->7564 7566 10004ed7 7567 10006d60 51 API calls 7566->7567 7568 10004ee9 7567->7568 7577 10007153 GetEnvironmentStringsW 7568->7577 7571 10004ef4 7573 1000571e _free 20 API calls 7571->7573 7574 10004f29 7573->7574 7575 10004eff 7576 1000571e _free 20 API calls 7575->7576 7576->7571 7578 1000716a 7577->7578 7588 100071bd 7577->7588 7579 10007170 WideCharToMultiByte 7578->7579 7582 1000718c 7579->7582 7579->7588 7580 100071c6 FreeEnvironmentStringsW 7581 10004eee 7580->7581 7581->7571 7589 10004f2f 7581->7589 7583 100056d0 21 API calls 7582->7583 7584 10007192 7583->7584 7585 100071af 7584->7585 7586 10007199 WideCharToMultiByte 7584->7586 7587 1000571e _free 20 API calls 7585->7587 7586->7585 7587->7588 7588->7580 7588->7581 7590 10004f44 7589->7590 7591 1000637b __dosmaperr 20 API calls 7590->7591 7593 10004f6b 7591->7593 7592 1000571e _free 20 API calls 7595 10004fe9 7592->7595 7594 10004fcf 7593->7594 7596 1000637b __dosmaperr 20 API calls 7593->7596 7597 10004fd1 7593->7597 7598 1000544d ___std_exception_copy 26 API calls 7593->7598 7601 10004ff3 7593->7601 7604 1000571e _free 20 API calls 7593->7604 7594->7592 7595->7575 7596->7593 7599 10005000 20 API calls 7597->7599 7598->7593 7600 10004fd7 7599->7600 7602 1000571e _free 20 API calls 7600->7602 7603 100062bc ___std_exception_copy 11 API calls 7601->7603 7602->7594 7605 10004fff 7603->7605 7604->7593 6114 10002418 6115 10002420 ___scrt_release_startup_lock 6114->6115 6118 100047f5 6115->6118 6117 10002448 6119 10004804 6118->6119 6120 10004808 6118->6120 6119->6117 6123 10004815 6120->6123 6124 10005b7a __dosmaperr 20 API calls 6123->6124 6127 1000482c 6124->6127 6125 10002ada _ValidateLocalCookies 5 API calls 6126 10004811 6125->6126 6126->6117 6127->6125 7437 10004a9a 7440 10005411 7437->7440 7441 1000541d _abort 7440->7441 7442 10005af6 _abort 38 API calls 7441->7442 7445 10005422 7442->7445 7443 100055a8 _abort 38 API calls 7444 1000544c 7443->7444 7445->7443 5856 10001c5b 5857 10001c6b ___scrt_fastfail 5856->5857 5860 100012ee 5857->5860 5859 10001c87 5861 10001324 ___scrt_fastfail 5860->5861 5862 100013b7 GetEnvironmentVariableW 5861->5862 5886 100010f1 5862->5886 5865 100010f1 57 API calls 5866 10001465 5865->5866 5867 100010f1 57 API calls 5866->5867 5868 10001479 5867->5868 5869 100010f1 57 API calls 5868->5869 5870 1000148d 5869->5870 5871 100010f1 57 API calls 5870->5871 5872 100014a1 5871->5872 5873 100010f1 57 API calls 5872->5873 5874 100014b5 lstrlenW 5873->5874 5875 100014d2 5874->5875 5876 100014d9 lstrlenW 5874->5876 5875->5859 5877 100010f1 57 API calls 5876->5877 5878 10001501 lstrlenW lstrcatW 5877->5878 5879 100010f1 57 API calls 5878->5879 5880 10001539 lstrlenW lstrcatW 5879->5880 5881 100010f1 57 API calls 5880->5881 5882 1000156b lstrlenW lstrcatW 5881->5882 5883 100010f1 57 API calls 5882->5883 5884 1000159d lstrlenW lstrcatW 5883->5884 5885 100010f1 57 API calls 5884->5885 5885->5875 5887 10001118 ___scrt_fastfail 5886->5887 5888 10001129 lstrlenW 5887->5888 5899 10002c40 5888->5899 5890 10001148 lstrcatW lstrlenW 5891 10001177 lstrlenW FindFirstFileW 5890->5891 5892 10001168 lstrlenW 5890->5892 5893 100011a0 5891->5893 5894 100011e1 5891->5894 5892->5891 5895 100011c7 FindNextFileW 5893->5895 5898 100011aa 5893->5898 5894->5865 5895->5893 5896 100011da FindClose 5895->5896 5896->5894 5898->5895 5901 10001000 5898->5901 5900 10002c57 5899->5900 5900->5890 5900->5900 5902 10001022 ___scrt_fastfail 5901->5902 5903 100010af 5902->5903 5904 1000102f lstrcatW lstrlenW 5902->5904 5905 100010b5 lstrlenW 5903->5905 5906 100010ad 5903->5906 5907 1000105a lstrlenW 5904->5907 5908 1000106b lstrlenW 5904->5908 5932 10001e16 5905->5932 5906->5898 5907->5908 5918 10001e89 lstrlenW 5908->5918 5911 10001088 GetFileAttributesW 5911->5906 5913 1000109c 5911->5913 5912 100010ca 5912->5906 5914 10001e89 5 API calls 5912->5914 5913->5906 5924 1000173a 5913->5924 5916 100010df 5914->5916 5937 100011ea 5916->5937 5919 10002c40 ___scrt_fastfail 5918->5919 5920 10001ea7 lstrcatW lstrlenW 5919->5920 5921 10001ed1 lstrcatW 5920->5921 5922 10001ec2 5920->5922 5921->5911 5922->5921 5923 10001ec7 lstrlenW 5922->5923 5923->5921 5925 10001747 ___scrt_fastfail 5924->5925 5952 10001cca 5925->5952 5929 1000199f 5929->5906 5930 10001824 ___scrt_fastfail _strlen 5930->5929 5972 100015da 5930->5972 5933 10001e29 5932->5933 5936 10001e4c 5932->5936 5934 10001e2d lstrlenW 5933->5934 5933->5936 5935 10001e3f lstrlenW 5934->5935 5934->5936 5935->5936 5936->5912 5938 1000120e ___scrt_fastfail 5937->5938 5939 10001e89 5 API calls 5938->5939 5940 10001220 GetFileAttributesW 5939->5940 5941 10001235 5940->5941 5942 10001246 5940->5942 5941->5942 5944 1000173a 35 API calls 5941->5944 5943 10001e89 5 API calls 5942->5943 5945 10001258 5943->5945 5944->5942 5946 100010f1 56 API calls 5945->5946 5947 1000126d 5946->5947 5948 10001e89 5 API calls 5947->5948 5949 1000127f ___scrt_fastfail 5948->5949 5950 100010f1 56 API calls 5949->5950 5951 100012e6 5950->5951 5951->5906 5953 10001cf1 ___scrt_fastfail 5952->5953 5954 10001d0f CopyFileW CreateFileW 5953->5954 5955 10001d44 DeleteFileW 5954->5955 5956 10001d55 GetFileSize 5954->5956 5961 10001808 5955->5961 5957 10001ede 22 API calls 5956->5957 5958 10001d66 ReadFile 5957->5958 5959 10001d94 CloseHandle DeleteFileW 5958->5959 5960 10001d7d CloseHandle DeleteFileW 5958->5960 5959->5961 5960->5961 5961->5929 5962 10001ede 5961->5962 5964 1000222f 5962->5964 5965 1000224e 5964->5965 5968 10002250 5964->5968 5980 1000474f 5964->5980 5985 100047e5 5964->5985 5965->5930 5967 10002908 5969 100035d2 __CxxThrowException@8 RaiseException 5967->5969 5968->5967 5992 100035d2 5968->5992 5970 10002925 5969->5970 5970->5930 5973 1000160c _strcat _strlen 5972->5973 5974 1000163c lstrlenW 5973->5974 6080 10001c9d 5974->6080 5976 10001655 lstrcatW lstrlenW 5977 10001678 5976->5977 5978 10001693 ___scrt_fastfail 5977->5978 5979 1000167e lstrcatW 5977->5979 5978->5930 5979->5978 5995 10004793 5980->5995 5982 10004765 6001 10002ada 5982->6001 5984 1000478f 5984->5964 5990 100056d0 __dosmaperr 5985->5990 5986 1000570e 6014 10006368 5986->6014 5988 100056f9 RtlAllocateHeap 5989 1000570c 5988->5989 5988->5990 5989->5964 5990->5986 5990->5988 5991 1000474f __dosmaperr 7 API calls 5990->5991 5991->5990 5994 100035f2 RaiseException 5992->5994 5994->5967 5996 1000479f ___scrt_is_nonwritable_in_current_image 5995->5996 6008 10005671 RtlEnterCriticalSection 5996->6008 5998 100047aa 6009 100047dc 5998->6009 6000 100047d1 _abort 6000->5982 6002 10002ae3 6001->6002 6003 10002ae5 IsProcessorFeaturePresent 6001->6003 6002->5984 6005 10002b58 6003->6005 6013 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6005->6013 6007 10002c3b 6007->5984 6008->5998 6012 100056b9 RtlLeaveCriticalSection 6009->6012 6011 100047e3 6011->6000 6012->6011 6013->6007 6017 10005b7a GetLastError 6014->6017 6018 10005b93 6017->6018 6019 10005b99 6017->6019 6036 10005e08 6018->6036 6024 10005bf0 SetLastError 6019->6024 6043 1000637b 6019->6043 6023 10005bb3 6050 1000571e 6023->6050 6025 10005bf9 6024->6025 6025->5989 6029 10005bb9 6031 10005be7 SetLastError 6029->6031 6030 10005bcf 6063 1000593c 6030->6063 6031->6025 6034 1000571e _free 17 API calls 6035 10005be0 6034->6035 6035->6024 6035->6031 6068 10005c45 6036->6068 6038 10005e2f 6039 10005e47 TlsGetValue 6038->6039 6040 10005e3b 6038->6040 6039->6040 6041 10002ada _ValidateLocalCookies 5 API calls 6040->6041 6042 10005e58 6041->6042 6042->6019 6048 10006388 __dosmaperr 6043->6048 6044 100063c8 6047 10006368 _free 19 API calls 6044->6047 6045 100063b3 RtlAllocateHeap 6046 10005bab 6045->6046 6045->6048 6046->6023 6056 10005e5e 6046->6056 6047->6046 6048->6044 6048->6045 6049 1000474f __dosmaperr 7 API calls 6048->6049 6049->6048 6051 10005752 _free 6050->6051 6052 10005729 HeapFree 6050->6052 6051->6029 6052->6051 6053 1000573e 6052->6053 6054 10006368 _free 18 API calls 6053->6054 6055 10005744 GetLastError 6054->6055 6055->6051 6057 10005c45 __dosmaperr 5 API calls 6056->6057 6058 10005e85 6057->6058 6059 10005ea0 TlsSetValue 6058->6059 6060 10005e94 6058->6060 6059->6060 6061 10002ada _ValidateLocalCookies 5 API calls 6060->6061 6062 10005bc8 6061->6062 6062->6023 6062->6030 6074 10005914 6063->6074 6069 10005c71 6068->6069 6070 10005c75 __crt_fast_encode_pointer 6068->6070 6069->6070 6071 10005ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6069->6071 6073 10005c95 6069->6073 6070->6038 6071->6069 6072 10005ca1 GetProcAddress 6072->6070 6073->6070 6073->6072 6075 10005854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6074->6075 6076 10005938 6075->6076 6077 100058c4 6076->6077 6078 10005758 __dosmaperr 20 API calls 6077->6078 6079 100058e8 6078->6079 6079->6034 6081 10001ca6 _strlen 6080->6081 6081->5976 7606 100020db 7609 100020e7 ___scrt_is_nonwritable_in_current_image 7606->7609 7607 100020f6 7608 10002110 dllmain_raw 7608->7607 7610 1000212a 7608->7610 7609->7607 7609->7608 7614 1000210b 7609->7614 7619 10001eec 7610->7619 7612 10002177 7612->7607 7613 10001eec 31 API calls 7612->7613 7615 1000218a 7613->7615 7614->7607 7614->7612 7617 10001eec 31 API calls 7614->7617 7615->7607 7616 10002193 dllmain_raw 7615->7616 7616->7607 7618 1000216d dllmain_raw 7617->7618 7618->7612 7620 10001ef7 7619->7620 7621 10001f2a dllmain_crt_process_detach 7619->7621 7622 10001f1c dllmain_crt_process_attach 7620->7622 7623 10001efc 7620->7623 7628 10001f06 7621->7628 7622->7628 7624 10001f01 7623->7624 7625 10001f12 7623->7625 7624->7628 7629 1000240b 7624->7629 7634 100023ec 7625->7634 7628->7614 7642 100053e5 7629->7642 7735 10003513 7634->7735 7637 100023f5 7637->7628 7640 10002408 7640->7628 7641 1000351e 7 API calls 7641->7637 7648 10005aca 7642->7648 7645 1000351e 7724 10003820 7645->7724 7647 10002415 7647->7628 7649 10005ad4 7648->7649 7650 10002410 7648->7650 7651 10005e08 __dosmaperr 11 API calls 7649->7651 7650->7645 7652 10005adb 7651->7652 7652->7650 7653 10005e5e __dosmaperr 11 API calls 7652->7653 7654 10005aee 7653->7654 7656 100059b5 7654->7656 7657 100059c0 7656->7657 7661 100059d0 7656->7661 7662 100059d6 7657->7662 7660 1000571e _free 20 API calls 7660->7661 7661->7650 7663 100059e9 7662->7663 7666 100059ef 7662->7666 7664 1000571e _free 20 API calls 7663->7664 7664->7666 7665 1000571e _free 20 API calls 7667 100059fb 7665->7667 7666->7665 7668 1000571e _free 20 API calls 7667->7668 7669 10005a06 7668->7669 7670 1000571e _free 20 API calls 7669->7670 7671 10005a11 7670->7671 7672 1000571e _free 20 API calls 7671->7672 7673 10005a1c 7672->7673 7674 1000571e _free 20 API calls 7673->7674 7675 10005a27 7674->7675 7676 1000571e _free 20 API calls 7675->7676 7677 10005a32 7676->7677 7678 1000571e _free 20 API calls 7677->7678 7679 10005a3d 7678->7679 7680 1000571e _free 20 API calls 7679->7680 7681 10005a48 7680->7681 7682 1000571e _free 20 API calls 7681->7682 7683 10005a56 7682->7683 7688 1000589c 7683->7688 7694 100057a8 7688->7694 7690 100058c0 7691 100058ec 7690->7691 7707 10005809 7691->7707 7693 10005910 7693->7660 7695 100057b4 ___scrt_is_nonwritable_in_current_image 7694->7695 7702 10005671 RtlEnterCriticalSection 7695->7702 7698 100057be 7699 1000571e _free 20 API calls 7698->7699 7700 100057e8 7698->7700 7699->7700 7703 100057fd 7700->7703 7701 100057f5 _abort 7701->7690 7702->7698 7706 100056b9 RtlLeaveCriticalSection 7703->7706 7705 10005807 7705->7701 7706->7705 7708 10005815 ___scrt_is_nonwritable_in_current_image 7707->7708 7715 10005671 RtlEnterCriticalSection 7708->7715 7710 1000581f 7716 10005a7f 7710->7716 7712 10005832 7720 10005848 7712->7720 7714 10005840 _abort 7714->7693 7715->7710 7717 10005ab5 __fassign 7716->7717 7718 10005a8e __fassign 7716->7718 7717->7712 7718->7717 7719 10007cc2 __fassign 20 API calls 7718->7719 7719->7717 7723 100056b9 RtlLeaveCriticalSection 7720->7723 7722 10005852 7722->7714 7723->7722 7725 1000384b ___vcrt_freefls@4 7724->7725 7727 1000382d 7724->7727 7725->7647 7726 1000383b 7729 10003ba2 ___vcrt_FlsSetValue 6 API calls 7726->7729 7727->7726 7730 10003b67 7727->7730 7729->7725 7731 10003a82 try_get_function 5 API calls 7730->7731 7732 10003b81 7731->7732 7733 10003b99 TlsGetValue 7732->7733 7734 10003b8d 7732->7734 7733->7734 7734->7726 7741 10003856 7735->7741 7737 100023f1 7737->7637 7738 100053da 7737->7738 7739 10005b7a __dosmaperr 20 API calls 7738->7739 7740 100023fd 7739->7740 7740->7640 7740->7641 7742 10003862 GetLastError 7741->7742 7743 1000385f 7741->7743 7744 10003b67 ___vcrt_FlsGetValue 6 API calls 7742->7744 7743->7737 7745 10003877 7744->7745 7746 100038dc SetLastError 7745->7746 7747 10003ba2 ___vcrt_FlsSetValue 6 API calls 7745->7747 7752 10003896 7745->7752 7746->7737 7748 10003890 7747->7748 7749 100038b8 7748->7749 7750 10003ba2 ___vcrt_FlsSetValue 6 API calls 7748->7750 7748->7752 7751 10003ba2 ___vcrt_FlsSetValue 6 API calls 7749->7751 7749->7752 7750->7749 7751->7752 7752->7746 6128 1000281c 6131 10002882 6128->6131 6134 10003550 6131->6134 6133 1000282a 6135 1000358a 6134->6135 6136 1000355d 6134->6136 6135->6133 6136->6135 6137 100047e5 ___std_exception_copy 21 API calls 6136->6137 6138 1000357a 6137->6138 6138->6135 6140 1000544d 6138->6140 6141 1000545a 6140->6141 6143 10005468 6140->6143 6141->6143 6147 1000547f 6141->6147 6142 10006368 _free 20 API calls 6144 10005470 6142->6144 6143->6142 6149 100062ac 6144->6149 6146 1000547a 6146->6135 6147->6146 6148 10006368 _free 20 API calls 6147->6148 6148->6144 6152 10006231 6149->6152 6151 100062b8 6151->6146 6153 10005b7a __dosmaperr 20 API calls 6152->6153 6154 10006247 6153->6154 6155 100062a6 6154->6155 6158 10006255 6154->6158 6163 100062bc IsProcessorFeaturePresent 6155->6163 6157 100062ab 6159 10006231 ___std_exception_copy 26 API calls 6157->6159 6160 10002ada _ValidateLocalCookies 5 API calls 6158->6160 6161 100062b8 6159->6161 6162 1000627c 6160->6162 6161->6151 6162->6151 6164 100062c7 6163->6164 6167 100060e2 6164->6167 6168 100060fe ___scrt_fastfail 6167->6168 6169 1000612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6168->6169 6172 100061fb ___scrt_fastfail 6169->6172 6170 10002ada _ValidateLocalCookies 5 API calls 6171 10006219 GetCurrentProcess TerminateProcess 6170->6171 6171->6157 6172->6170 7753 10004bdd 7754 10004c08 7753->7754 7755 10004bec 7753->7755 7757 10006d60 51 API calls 7754->7757 7755->7754 7756 10004bf2 7755->7756 7758 10006368 _free 20 API calls 7756->7758 7759 10004c0f GetModuleFileNameA 7757->7759 7760 10004bf7 7758->7760 7761 10004c33 7759->7761 7762 100062ac ___std_exception_copy 26 API calls 7760->7762 7776 10004d01 7761->7776 7763 10004c01 7762->7763 7768 10004c72 7771 10004d01 38 API calls 7768->7771 7769 10004c66 7770 10006368 _free 20 API calls 7769->7770 7775 10004c6b 7770->7775 7773 10004c88 7771->7773 7772 1000571e _free 20 API calls 7772->7763 7774 1000571e _free 20 API calls 7773->7774 7773->7775 7774->7775 7775->7772 7778 10004d26 7776->7778 7780 10004d86 7778->7780 7788 100070eb 7778->7788 7779 10004c50 7782 10004e76 7779->7782 7780->7779 7781 100070eb 38 API calls 7780->7781 7781->7780 7783 10004e8b 7782->7783 7784 10004c5d 7782->7784 7783->7784 7785 1000637b __dosmaperr 20 API calls 7783->7785 7784->7768 7784->7769 7786 10004eb9 7785->7786 7787 1000571e _free 20 API calls 7786->7787 7787->7784 7791 10007092 7788->7791 7792 100054a7 __fassign 38 API calls 7791->7792 7793 100070a6 7792->7793 7793->7778 7152 10007260 GetStartupInfoW 7153 10007286 7152->7153 7155 10007318 7152->7155 7153->7155 7158 10008be3 7153->7158 7156 100072af 7156->7155 7157 100072dd GetFileType 7156->7157 7157->7156 7159 10008bef ___scrt_is_nonwritable_in_current_image 7158->7159 7160 10008c13 7159->7160 7161 10008bfc 7159->7161 7171 10005671 RtlEnterCriticalSection 7160->7171 7162 10006368 _free 20 API calls 7161->7162 7164 10008c01 7162->7164 7165 100062ac ___std_exception_copy 26 API calls 7164->7165 7166 10008c0b _abort 7165->7166 7166->7156 7167 10008c4b 7179 10008c72 7167->7179 7169 10008c1f 7169->7167 7172 10008b34 7169->7172 7171->7169 7173 1000637b __dosmaperr 20 API calls 7172->7173 7174 10008b46 7173->7174 7177 10005eb7 11 API calls 7174->7177 7178 10008b53 7174->7178 7175 1000571e _free 20 API calls 7176 10008ba5 7175->7176 7176->7169 7177->7174 7178->7175 7182 100056b9 RtlLeaveCriticalSection 7179->7182 7181 10008c79 7181->7166 7182->7181 7446 100081a0 7447 100081d9 7446->7447 7448 100081dd 7447->7448 7459 10008205 7447->7459 7449 10006368 _free 20 API calls 7448->7449 7450 100081e2 7449->7450 7452 100062ac ___std_exception_copy 26 API calls 7450->7452 7451 10008529 7453 10002ada _ValidateLocalCookies 5 API calls 7451->7453 7454 100081ed 7452->7454 7455 10008536 7453->7455 7456 10002ada _ValidateLocalCookies 5 API calls 7454->7456 7458 100081f9 7456->7458 7459->7451 7460 100080c0 7459->7460 7461 100080db 7460->7461 7462 10002ada _ValidateLocalCookies 5 API calls 7461->7462 7463 10008152 7462->7463 7463->7459 7794 1000a1e0 7797 1000a1fe 7794->7797 7796 1000a1f6 7799 1000a203 7797->7799 7798 1000aa53 21 API calls 7801 1000a42f 7798->7801 7799->7798 7800 1000a298 7799->7800 7800->7796 7801->7796 7183 10009d61 7184 10009d81 7183->7184 7187 10009db8 7184->7187 7186 10009dab 7189 10009dbf 7187->7189 7188 10009e20 7190 1000a90e 7188->7190 7191 1000aa17 21 API calls 7188->7191 7189->7188 7193 10009ddf 7189->7193 7190->7186 7192 10009e6e 7191->7192 7192->7186 7193->7190 7194 1000aa17 21 API calls 7193->7194 7195 1000a93e 7194->7195 7195->7186 7464 100021a1 ___scrt_dllmain_exception_filter 5824 1000c7a7 5825 1000c7be 5824->5825 5831 1000c82c 5824->5831 5825->5831 5836 1000c7e6 GetModuleHandleA 5825->5836 5827 1000c835 GetModuleHandleA 5830 1000c83f 5827->5830 5828 1000c872 5829 1000c7dd 5829->5830 5829->5831 5833 1000c800 GetProcAddress 5829->5833 5830->5831 5832 1000c85f GetProcAddress 5830->5832 5831->5827 5831->5828 5831->5830 5832->5831 5833->5831 5834 1000c80d VirtualProtect 5833->5834 5834->5831 5835 1000c81c VirtualProtect 5834->5835 5835->5831 5837 1000c7ef 5836->5837 5845 1000c82c 5836->5845 5848 1000c803 GetProcAddress 5837->5848 5839 1000c7f4 5842 1000c800 GetProcAddress 5839->5842 5839->5845 5840 1000c872 5841 1000c835 GetModuleHandleA 5844 1000c83f 5841->5844 5843 1000c80d VirtualProtect 5842->5843 5842->5845 5843->5845 5846 1000c81c VirtualProtect 5843->5846 5844->5845 5847 1000c85f GetProcAddress 5844->5847 5845->5840 5845->5841 5845->5844 5846->5845 5847->5845 5849 1000c82c 5848->5849 5850 1000c80d VirtualProtect 5848->5850 5852 1000c872 5849->5852 5853 1000c835 GetModuleHandleA 5849->5853 5850->5849 5851 1000c81c VirtualProtect 5850->5851 5851->5849 5855 1000c83f 5853->5855 5854 1000c85f GetProcAddress 5854->5855 5855->5849 5855->5854 6173 1000742b 6174 10007430 6173->6174 6175 10007453 6174->6175 6177 10008bae 6174->6177 6178 10008bdd 6177->6178 6179 10008bbb 6177->6179 6178->6174 6180 10008bd7 6179->6180 6181 10008bc9 RtlDeleteCriticalSection 6179->6181 6182 1000571e _free 20 API calls 6180->6182 6181->6180 6181->6181 6182->6178 7196 1000ac6b 7197 1000ac84 __startOneArgErrorHandling 7196->7197 7199 1000acad __startOneArgErrorHandling 7197->7199 7200 1000b2f0 7197->7200 7201 1000b329 __startOneArgErrorHandling 7200->7201 7202 1000b5c1 __raise_exc RaiseException 7201->7202 7203 1000b350 __startOneArgErrorHandling 7201->7203 7202->7203 7204 1000b393 7203->7204 7205 1000b36e 7203->7205 7206 1000b8b2 __startOneArgErrorHandling 20 API calls 7204->7206 7211 1000b8e1 7205->7211 7208 1000b38e __startOneArgErrorHandling 7206->7208 7209 10002ada _ValidateLocalCookies 5 API calls 7208->7209 7210 1000b3b7 7209->7210 7210->7199 7212 1000b8f0 7211->7212 7213 1000b90f __startOneArgErrorHandling 7212->7213 7214 1000b964 __startOneArgErrorHandling 7212->7214 7215 100078a3 __startOneArgErrorHandling 5 API calls 7213->7215 7216 1000b8b2 __startOneArgErrorHandling 20 API calls 7214->7216 7217 1000b950 7215->7217 7219 1000b95d 7216->7219 7218 1000b8b2 __startOneArgErrorHandling 20 API calls 7217->7218 7217->7219 7218->7219 7219->7208 7465 100060ac 7466 100060b7 7465->7466 7468 100060dd 7465->7468 7467 100060c7 FreeLibrary 7466->7467 7466->7468 7467->7466 7220 1000506f 7221 10005081 7220->7221 7222 10005087 7220->7222 7223 10005000 20 API calls 7221->7223 7223->7222 6183 10005630 6184 1000563b 6183->6184 6186 10005664 6184->6186 6188 10005660 6184->6188 6189 10005eb7 6184->6189 6196 10005688 6186->6196 6190 10005c45 __dosmaperr 5 API calls 6189->6190 6191 10005ede 6190->6191 6192 10005efc InitializeCriticalSectionAndSpinCount 6191->6192 6195 10005ee7 6191->6195 6192->6195 6193 10002ada _ValidateLocalCookies 5 API calls 6194 10005f13 6193->6194 6194->6184 6195->6193 6197 100056b4 6196->6197 6198 10005695 6196->6198 6197->6188 6199 1000569f RtlDeleteCriticalSection 6198->6199 6199->6197 6199->6199 7224 10003370 7235 10003330 7224->7235 7236 10003342 7235->7236 7237 1000334f 7235->7237 7238 10002ada _ValidateLocalCookies 5 API calls 7236->7238 7238->7237 7802 100063f0 7803 10006400 7802->7803 7806 10006416 7802->7806 7804 10006368 _free 20 API calls 7803->7804 7805 10006405 7804->7805 7808 100062ac ___std_exception_copy 26 API calls 7805->7808 7809 10006480 7806->7809 7814 10006561 7806->7814 7821 10006580 7806->7821 7807 10004e76 20 API calls 7810 100064e5 7807->7810 7816 1000640f 7808->7816 7809->7807 7812 100064ee 7810->7812 7818 10006573 7810->7818 7832 100085eb 7810->7832 7813 1000571e _free 20 API calls 7812->7813 7813->7814 7841 1000679a 7814->7841 7819 100062bc ___std_exception_copy 11 API calls 7818->7819 7820 1000657f 7819->7820 7822 1000658c 7821->7822 7822->7822 7823 1000637b __dosmaperr 20 API calls 7822->7823 7824 100065ba 7823->7824 7825 100085eb 26 API calls 7824->7825 7826 100065e6 7825->7826 7827 100062bc ___std_exception_copy 11 API calls 7826->7827 7828 10006615 ___scrt_fastfail 7827->7828 7829 100066b6 FindFirstFileExA 7828->7829 7830 10006705 7829->7830 7831 10006580 26 API calls 7830->7831 7835 1000853a 7832->7835 7833 1000854f 7834 10006368 _free 20 API calls 7833->7834 7836 10008554 7833->7836 7840 1000857a 7834->7840 7835->7833 7835->7836 7838 1000858b 7835->7838 7836->7810 7837 100062ac ___std_exception_copy 26 API calls 7837->7836 7838->7836 7839 10006368 _free 20 API calls 7838->7839 7839->7840 7840->7837 7845 100067a4 7841->7845 7842 100067b4 7844 1000571e _free 20 API calls 7842->7844 7843 1000571e _free 20 API calls 7843->7845 7846 100067bb 7844->7846 7845->7842 7845->7843 7846->7816 7239 10009e71 7240 10009e95 7239->7240 7241 10009ee6 7240->7241 7243 10009f71 __startOneArgErrorHandling 7240->7243 7244 10009ef8 7241->7244 7247 1000aa53 7241->7247 7245 1000b2f0 21 API calls 7243->7245 7246 1000acad __startOneArgErrorHandling 7243->7246 7245->7246 7248 1000aa70 RtlDecodePointer 7247->7248 7249 1000aa80 7247->7249 7248->7249 7250 1000ab0d 7249->7250 7253 1000ab02 7249->7253 7255 1000aab7 7249->7255 7250->7253 7254 10006368 _free 20 API calls 7250->7254 7251 10002ada _ValidateLocalCookies 5 API calls 7252 1000ac67 7251->7252 7252->7244 7253->7251 7254->7253 7255->7253 7256 10006368 _free 20 API calls 7255->7256 7256->7253 7473 10003eb3 7474 10005411 38 API calls 7473->7474 7475 10003ebb 7474->7475 6200 1000543d 6201 10005440 6200->6201 6204 100055a8 6201->6204 6215 10007613 6204->6215 6207 100055b8 6209 100055c2 IsProcessorFeaturePresent 6207->6209 6214 100055e0 6207->6214 6211 100055cd 6209->6211 6212 100060e2 _abort 8 API calls 6211->6212 6212->6214 6245 10004bc1 6214->6245 6248 10007581 6215->6248 6218 1000766e 6219 1000767a _abort 6218->6219 6220 10005b7a __dosmaperr 20 API calls 6219->6220 6221 100076a1 _abort 6219->6221 6225 100076a7 _abort 6219->6225 6220->6221 6222 100076f3 6221->6222 6221->6225 6244 100076d6 6221->6244 6223 10006368 _free 20 API calls 6222->6223 6224 100076f8 6223->6224 6227 100062ac ___std_exception_copy 26 API calls 6224->6227 6230 1000771f 6225->6230 6262 10005671 RtlEnterCriticalSection 6225->6262 6227->6244 6231 1000777e 6230->6231 6233 10007776 6230->6233 6241 100077a9 6230->6241 6263 100056b9 RtlLeaveCriticalSection 6230->6263 6231->6241 6264 10007665 6231->6264 6236 10004bc1 _abort 28 API calls 6233->6236 6236->6231 6240 10007665 _abort 38 API calls 6240->6241 6267 1000782e 6241->6267 6242 1000780c 6243 10005af6 _abort 38 API calls 6242->6243 6242->6244 6243->6244 6291 1000bdc9 6244->6291 6295 1000499b 6245->6295 6251 10007527 6248->6251 6250 100055ad 6250->6207 6250->6218 6252 10007533 ___scrt_is_nonwritable_in_current_image 6251->6252 6257 10005671 RtlEnterCriticalSection 6252->6257 6254 10007541 6258 10007575 6254->6258 6256 10007568 _abort 6256->6250 6257->6254 6261 100056b9 RtlLeaveCriticalSection 6258->6261 6260 1000757f 6260->6256 6261->6260 6262->6230 6263->6233 6265 10005af6 _abort 38 API calls 6264->6265 6266 1000766a 6265->6266 6266->6240 6268 10007834 6267->6268 6269 100077fd 6267->6269 6294 100056b9 RtlLeaveCriticalSection 6268->6294 6269->6242 6269->6244 6271 10005af6 GetLastError 6269->6271 6272 10005b12 6271->6272 6273 10005b0c 6271->6273 6275 1000637b __dosmaperr 20 API calls 6272->6275 6277 10005b61 SetLastError 6272->6277 6274 10005e08 __dosmaperr 11 API calls 6273->6274 6274->6272 6276 10005b24 6275->6276 6278 10005b2c 6276->6278 6279 10005e5e __dosmaperr 11 API calls 6276->6279 6277->6242 6280 1000571e _free 20 API calls 6278->6280 6281 10005b41 6279->6281 6282 10005b32 6280->6282 6281->6278 6283 10005b48 6281->6283 6284 10005b6d SetLastError 6282->6284 6285 1000593c __dosmaperr 20 API calls 6283->6285 6287 100055a8 _abort 35 API calls 6284->6287 6286 10005b53 6285->6286 6288 1000571e _free 20 API calls 6286->6288 6289 10005b79 6287->6289 6290 10005b5a 6288->6290 6290->6277 6290->6284 6292 10002ada _ValidateLocalCookies 5 API calls 6291->6292 6293 1000bdd4 6292->6293 6293->6293 6294->6269 6296 100049a7 _abort 6295->6296 6303 100049bf 6296->6303 6317 10004af5 GetModuleHandleW 6296->6317 6300 10004a65 6334 10004aa5 6300->6334 6326 10005671 RtlEnterCriticalSection 6303->6326 6305 10004a3c 6307 10004a54 6305->6307 6330 10004669 6305->6330 6306 100049c7 6306->6300 6306->6305 6327 1000527a 6306->6327 6313 10004669 _abort 5 API calls 6307->6313 6308 10004a82 6337 10004ab4 6308->6337 6309 10004aae 6311 1000bdc9 _abort 5 API calls 6309->6311 6316 10004ab3 6311->6316 6313->6300 6318 100049b3 6317->6318 6318->6303 6319 10004b39 GetModuleHandleExW 6318->6319 6320 10004b63 GetProcAddress 6319->6320 6321 10004b78 6319->6321 6320->6321 6322 10004b95 6321->6322 6323 10004b8c FreeLibrary 6321->6323 6324 10002ada _ValidateLocalCookies 5 API calls 6322->6324 6323->6322 6325 10004b9f 6324->6325 6325->6303 6326->6306 6345 10005132 6327->6345 6331 10004698 6330->6331 6332 10002ada _ValidateLocalCookies 5 API calls 6331->6332 6333 100046c1 6332->6333 6333->6307 6367 100056b9 RtlLeaveCriticalSection 6334->6367 6336 10004a7e 6336->6308 6336->6309 6368 10006025 6337->6368 6340 10004ae2 6343 10004b39 _abort 8 API calls 6340->6343 6341 10004ac2 GetPEB 6341->6340 6342 10004ad2 GetCurrentProcess TerminateProcess 6341->6342 6342->6340 6344 10004aea ExitProcess 6343->6344 6348 100050e1 6345->6348 6347 10005156 6347->6305 6349 100050ed ___scrt_is_nonwritable_in_current_image 6348->6349 6356 10005671 RtlEnterCriticalSection 6349->6356 6351 100050fb 6357 1000515a 6351->6357 6355 10005119 _abort 6355->6347 6356->6351 6360 10005182 6357->6360 6361 1000517a 6357->6361 6358 10002ada _ValidateLocalCookies 5 API calls 6359 10005108 6358->6359 6363 10005126 6359->6363 6360->6361 6362 1000571e _free 20 API calls 6360->6362 6361->6358 6362->6361 6366 100056b9 RtlLeaveCriticalSection 6363->6366 6365 10005130 6365->6355 6366->6365 6367->6336 6369 10006040 6368->6369 6370 1000604a 6368->6370 6372 10002ada _ValidateLocalCookies 5 API calls 6369->6372 6371 10005c45 __dosmaperr 5 API calls 6370->6371 6371->6369 6373 10004abe 6372->6373 6373->6340 6373->6341 6374 10001f3f 6375 10001f4b ___scrt_is_nonwritable_in_current_image 6374->6375 6392 1000247c 6375->6392 6377 10001f52 6378 10002041 6377->6378 6379 10001f7c 6377->6379 6386 10001f57 ___scrt_is_nonwritable_in_current_image 6377->6386 6415 10002639 IsProcessorFeaturePresent 6378->6415 6403 100023de 6379->6403 6382 10002048 6383 10001f8b __RTC_Initialize 6383->6386 6406 100022fc RtlInitializeSListHead 6383->6406 6385 10001f99 ___scrt_initialize_default_local_stdio_options 6407 100046c5 6385->6407 6390 10001fb8 6390->6386 6391 10004669 _abort 5 API calls 6390->6391 6391->6386 6393 10002485 6392->6393 6419 10002933 IsProcessorFeaturePresent 6393->6419 6397 1000249a 6397->6377 6398 10002496 6398->6397 6430 100053c8 6398->6430 6401 100024b1 6401->6377 6504 100024b5 6403->6504 6405 100023e5 6405->6383 6406->6385 6408 100046dc 6407->6408 6409 10002ada _ValidateLocalCookies 5 API calls 6408->6409 6410 10001fad 6409->6410 6410->6386 6411 100023b3 6410->6411 6412 100023b8 ___scrt_release_startup_lock 6411->6412 6413 10002933 ___isa_available_init IsProcessorFeaturePresent 6412->6413 6414 100023c1 6412->6414 6413->6414 6414->6390 6416 1000264e ___scrt_fastfail 6415->6416 6417 100026f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6416->6417 6418 10002744 ___scrt_fastfail 6417->6418 6418->6382 6420 10002491 6419->6420 6421 100034ea 6420->6421 6422 100034ef ___vcrt_initialize_winapi_thunks 6421->6422 6441 10003936 6422->6441 6426 10003505 6427 10003510 6426->6427 6455 10003972 6426->6455 6427->6398 6429 100034fd 6429->6398 6496 10007457 6430->6496 6433 10003529 6434 10003532 6433->6434 6435 10003543 6433->6435 6436 1000391b ___vcrt_uninitialize_ptd 6 API calls 6434->6436 6435->6397 6437 10003537 6436->6437 6438 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6437->6438 6439 1000353c 6438->6439 6500 10003c50 6439->6500 6442 1000393f 6441->6442 6444 10003968 6442->6444 6445 100034f9 6442->6445 6459 10003be0 6442->6459 6446 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6444->6446 6445->6429 6447 100038e8 6445->6447 6446->6445 6477 10003af1 6447->6477 6450 100038fd 6450->6426 6453 10003918 6453->6426 6456 1000399c 6455->6456 6457 1000397d 6455->6457 6456->6429 6458 10003987 RtlDeleteCriticalSection 6457->6458 6458->6456 6458->6458 6464 10003a82 6459->6464 6461 10003bfa 6462 10003c18 InitializeCriticalSectionAndSpinCount 6461->6462 6463 10003c03 6461->6463 6462->6463 6463->6442 6465 10003aa6 __crt_fast_encode_pointer 6464->6465 6466 10003aaa 6464->6466 6465->6461 6466->6465 6470 100039be 6466->6470 6469 10003ac4 GetProcAddress 6469->6465 6475 100039cd try_get_first_available_module 6470->6475 6471 10003a77 6471->6465 6471->6469 6472 100039ea LoadLibraryExW 6473 10003a05 GetLastError 6472->6473 6472->6475 6473->6475 6474 10003a60 FreeLibrary 6474->6475 6475->6471 6475->6472 6475->6474 6476 10003a38 LoadLibraryExW 6475->6476 6476->6475 6478 10003a82 try_get_function 5 API calls 6477->6478 6479 10003b0b 6478->6479 6480 10003b24 TlsAlloc 6479->6480 6481 100038f2 6479->6481 6481->6450 6482 10003ba2 6481->6482 6483 10003a82 try_get_function 5 API calls 6482->6483 6484 10003bbc 6483->6484 6485 10003bd7 TlsSetValue 6484->6485 6486 1000390b 6484->6486 6485->6486 6486->6453 6487 1000391b 6486->6487 6488 1000392b 6487->6488 6489 10003925 6487->6489 6488->6450 6491 10003b2c 6489->6491 6492 10003a82 try_get_function 5 API calls 6491->6492 6493 10003b46 6492->6493 6494 10003b5e TlsFree 6493->6494 6495 10003b52 6493->6495 6494->6495 6495->6488 6499 10007470 6496->6499 6497 10002ada _ValidateLocalCookies 5 API calls 6498 100024a3 6497->6498 6498->6401 6498->6433 6499->6497 6501 10003c7f 6500->6501 6502 10003c59 6500->6502 6501->6435 6502->6501 6503 10003c69 FreeLibrary 6502->6503 6503->6502 6505 100024c4 6504->6505 6506 100024c8 6504->6506 6505->6405 6507 10002639 ___scrt_fastfail 4 API calls 6506->6507 6509 100024d5 ___scrt_release_startup_lock 6506->6509 6508 10002559 6507->6508 6509->6405 7476 100067bf 7481 100067f4 7476->7481 7479 100067db 7480 1000571e _free 20 API calls 7480->7479 7482 10006806 7481->7482 7491 100067cd 7481->7491 7483 10006836 7482->7483 7484 1000680b 7482->7484 7483->7491 7492 100071d6 7483->7492 7485 1000637b __dosmaperr 20 API calls 7484->7485 7487 10006814 7485->7487 7488 1000571e _free 20 API calls 7487->7488 7488->7491 7489 10006851 7490 1000571e _free 20 API calls 7489->7490 7490->7491 7491->7479 7491->7480 7493 100071e1 7492->7493 7494 10007209 7493->7494 7495 100071fa 7493->7495 7498 10007218 7494->7498 7501 10008a98 7494->7501 7496 10006368 _free 20 API calls 7495->7496 7500 100071ff ___scrt_fastfail 7496->7500 7508 10008acb 7498->7508 7500->7489 7502 10008aa3 7501->7502 7503 10008ab8 RtlSizeHeap 7501->7503 7504 10006368 _free 20 API calls 7502->7504 7503->7498 7505 10008aa8 7504->7505 7506 100062ac ___std_exception_copy 26 API calls 7505->7506 7507 10008ab3 7506->7507 7507->7498 7509 10008ae3 7508->7509 7510 10008ad8 7508->7510 7512 10008aeb 7509->7512 7518 10008af4 __dosmaperr 7509->7518 7511 100056d0 21 API calls 7510->7511 7517 10008ae0 7511->7517 7515 1000571e _free 20 API calls 7512->7515 7513 10008af9 7516 10006368 _free 20 API calls 7513->7516 7514 10008b1e RtlReAllocateHeap 7514->7517 7514->7518 7515->7517 7516->7517 7517->7500 7518->7513 7518->7514 7519 1000474f __dosmaperr 7 API calls 7518->7519 7519->7518 7847 10005bff 7855 10005d5c 7847->7855 7850 10005c13 7851 10005b7a __dosmaperr 20 API calls 7852 10005c1b 7851->7852 7853 10005c28 7852->7853 7854 10005c2b 11 API calls 7852->7854 7854->7850 7856 10005c45 __dosmaperr 5 API calls 7855->7856 7857 10005d83 7856->7857 7858 10005d9b TlsAlloc 7857->7858 7859 10005d8c 7857->7859 7858->7859 7860 10002ada _ValidateLocalCookies 5 API calls 7859->7860 7861 10005c09 7860->7861 7861->7850 7861->7851

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                        • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                        • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                        • String ID:
                                                                                        • API String ID: 1083526818-0
                                                                                        • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                        • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                        • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                        • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                          • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                          • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                          • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                          • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                          • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                        • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                        • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                        • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                        • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                        • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                        • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                        • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                        • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                        • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                        • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                        • String ID: )$Foxmail$ProgramFiles
                                                                                        • API String ID: 672098462-2938083778
                                                                                        • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                        • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                        • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                        • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                        • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                          • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                          • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                          • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProcProtectVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 2099061454-0
                                                                                        • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                        • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                        • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                        • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 79 1000c7a7-1000c7bc 80 1000c82d 79->80 81 1000c7be-1000c7c6 79->81 83 1000c82f-1000c833 80->83 81->80 82 1000c7c8-1000c7f6 call 1000c7e6 81->82 91 1000c7f8 82->91 92 1000c86c-1000c86e 82->92 85 1000c872 call 1000c877 83->85 86 1000c835-1000c83d GetModuleHandleA 83->86 89 1000c83f-1000c847 86->89 89->89 90 1000c849-1000c84c 89->90 90->83 93 1000c84e-1000c850 90->93 94 1000c7fa-1000c7fe 91->94 95 1000c85b-1000c85e 91->95 96 1000c870 92->96 97 1000c866-1000c86b 92->97 98 1000c852-1000c854 93->98 99 1000c856-1000c85a 93->99 102 1000c865 94->102 103 1000c800-1000c80b GetProcAddress 94->103 100 1000c85f-1000c860 GetProcAddress 95->100 96->90 97->92 98->100 99->95 100->102 102->97 103->80 104 1000c80d-1000c81a VirtualProtect 103->104 105 1000c82c 104->105 106 1000c81c-1000c82a VirtualProtect 104->106 105->80 106->105
                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                          • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                          • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                          • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                          • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProcProtectVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 2099061454-0
                                                                                        • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                        • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                        • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                        • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 107 1000c803-1000c80b GetProcAddress 108 1000c82d 107->108 109 1000c80d-1000c81a VirtualProtect 107->109 112 1000c82f-1000c833 108->112 110 1000c82c 109->110 111 1000c81c-1000c82a VirtualProtect 109->111 110->108 111->110 113 1000c872 call 1000c877 112->113 114 1000c835-1000c83d GetModuleHandleA 112->114 116 1000c83f-1000c847 114->116 116->116 117 1000c849-1000c84c 116->117 117->112 118 1000c84e-1000c850 117->118 119 1000c852-1000c854 118->119 120 1000c856-1000c85e 118->120 121 1000c85f-1000c865 GetProcAddress 119->121 120->121 124 1000c866-1000c86e 121->124 126 1000c870 124->126 126->117
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                        • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                        • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                        • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProcProtectVirtual$HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 2152742572-0
                                                                                        • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                        • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                        • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                        • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                        • String ID:
                                                                                        • API String ID: 3906539128-0
                                                                                        • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                        • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                        • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                        • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                        • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                        • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                        • String ID:
                                                                                        • API String ID: 1703294689-0
                                                                                        • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                        • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                        • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                        • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: .
                                                                                        • API String ID: 0-248832578
                                                                                        • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                        • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                        • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                        • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: HeapProcess
                                                                                        • String ID:
                                                                                        • API String ID: 54951025-0
                                                                                        • Opcode ID: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                                                        • Instruction ID: 1e6cba0042ebf2c12c09a4b69519b161692f08ba8376aa17aabccb2fe2e68a66
                                                                                        • Opcode Fuzzy Hash: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                                                        • Instruction Fuzzy Hash: 81A01130A002228FE3208F308A8A30E3AACAA002C0B00803AE80CC0028EB30C0028B00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 136 1000173a-100017fe call 1000c030 call 10002c40 * 2 143 10001803 call 10001cca 136->143 144 10001808-1000180c 143->144 145 10001812-10001816 144->145 146 100019ad-100019b1 144->146 145->146 147 1000181c-10001837 call 10001ede 145->147 150 1000183d-10001845 147->150 151 1000199f-100019ac call 10001ee7 * 2 147->151 153 10001982-10001985 150->153 154 1000184b-1000184e 150->154 151->146 156 10001995-10001999 153->156 157 10001987 153->157 154->153 158 10001854-10001881 call 100044b0 * 2 call 10001db7 154->158 156->150 156->151 160 1000198a-1000198d call 10002c40 157->160 170 10001887-1000189f call 100044b0 call 10001db7 158->170 171 1000193d-10001943 158->171 166 10001992 160->166 166->156 170->171 187 100018a5-100018a8 170->187 173 10001945-10001947 171->173 174 1000197e-10001980 171->174 173->174 175 10001949-1000194b 173->175 174->160 177 10001961-1000197c call 100016aa 175->177 178 1000194d-1000194f 175->178 177->166 180 10001951-10001953 178->180 181 10001955-10001957 178->181 180->177 180->181 184 10001959-1000195b 181->184 185 1000195d-1000195f 181->185 184->177 184->185 185->174 185->177 188 100018c4-100018dc call 100044b0 call 10001db7 187->188 189 100018aa-100018c2 call 100044b0 call 10001db7 187->189 188->156 198 100018e2-1000193b call 100016aa call 100015da call 10002c40 * 2 188->198 189->188 189->198 198->156
                                                                                        APIs
                                                                                          • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                          • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                          • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                        • _strlen.LIBCMT ref: 10001855
                                                                                        • _strlen.LIBCMT ref: 10001869
                                                                                        • _strlen.LIBCMT ref: 1000188B
                                                                                        • _strlen.LIBCMT ref: 100018AE
                                                                                        • _strlen.LIBCMT ref: 100018C8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strlen$File$CopyCreateDelete
                                                                                        • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                        • API String ID: 3296212668-3023110444
                                                                                        • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                        • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                        • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                        • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strlen
                                                                                        • String ID: %m$~$Gon~$~F@7$~dra
                                                                                        • API String ID: 4218353326-230879103
                                                                                        • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                        • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                        • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                        • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 276 10007cc2-10007cd6 277 10007d44-10007d4c 276->277 278 10007cd8-10007cdd 276->278 280 10007d93-10007dab call 10007e35 277->280 281 10007d4e-10007d51 277->281 278->277 279 10007cdf-10007ce4 278->279 279->277 282 10007ce6-10007ce9 279->282 290 10007dae-10007db5 280->290 281->280 284 10007d53-10007d90 call 1000571e * 4 281->284 282->277 285 10007ceb-10007cf3 282->285 284->280 288 10007cf5-10007cf8 285->288 289 10007d0d-10007d15 285->289 288->289 292 10007cfa-10007d0c call 1000571e call 100090ba 288->292 295 10007d17-10007d1a 289->295 296 10007d2f-10007d43 call 1000571e * 2 289->296 293 10007dd4-10007dd8 290->293 294 10007db7-10007dbb 290->294 292->289 298 10007df0-10007dfc 293->298 299 10007dda-10007ddf 293->299 302 10007dd1 294->302 303 10007dbd-10007dc0 294->303 295->296 304 10007d1c-10007d2e call 1000571e call 100091b8 295->304 296->277 298->290 311 10007dfe-10007e0b call 1000571e 298->311 308 10007de1-10007de4 299->308 309 10007ded 299->309 302->293 303->302 313 10007dc2-10007dd0 call 1000571e * 2 303->313 304->296 308->309 316 10007de6-10007dec call 1000571e 308->316 309->298 313->302 316->309
                                                                                        APIs
                                                                                        • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                          • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                        • _free.LIBCMT ref: 10007CFB
                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                        • _free.LIBCMT ref: 10007D1D
                                                                                        • _free.LIBCMT ref: 10007D32
                                                                                        • _free.LIBCMT ref: 10007D3D
                                                                                        • _free.LIBCMT ref: 10007D5F
                                                                                        • _free.LIBCMT ref: 10007D72
                                                                                        • _free.LIBCMT ref: 10007D80
                                                                                        • _free.LIBCMT ref: 10007D8B
                                                                                        • _free.LIBCMT ref: 10007DC3
                                                                                        • _free.LIBCMT ref: 10007DCA
                                                                                        • _free.LIBCMT ref: 10007DE7
                                                                                        • _free.LIBCMT ref: 10007DFF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                        • String ID:
                                                                                        • API String ID: 161543041-0
                                                                                        • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                        • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                        • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                        • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 100059EA
                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                        • _free.LIBCMT ref: 100059F6
                                                                                        • _free.LIBCMT ref: 10005A01
                                                                                        • _free.LIBCMT ref: 10005A0C
                                                                                        • _free.LIBCMT ref: 10005A17
                                                                                        • _free.LIBCMT ref: 10005A22
                                                                                        • _free.LIBCMT ref: 10005A2D
                                                                                        • _free.LIBCMT ref: 10005A38
                                                                                        • _free.LIBCMT ref: 10005A43
                                                                                        • _free.LIBCMT ref: 10005A51
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                        • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                        • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                        • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                        • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                        • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                        • String ID:
                                                                                        • API String ID: 1454806937-0
                                                                                        • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                        • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                        • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                        • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 377 10009492-100094ef GetConsoleCP 378 10009632-10009644 call 10002ada 377->378 379 100094f5-10009511 377->379 381 10009513-1000952a 379->381 382 1000952c-1000953d call 10007c19 379->382 384 10009566-10009575 call 100079e6 381->384 389 10009563-10009565 382->389 390 1000953f-10009542 382->390 384->378 391 1000957b-1000959b WideCharToMultiByte 384->391 389->384 392 10009548-1000955a call 100079e6 390->392 393 10009609-10009628 390->393 391->378 394 100095a1-100095b7 WriteFile 391->394 392->378 399 10009560-10009561 392->399 393->378 396 100095b9-100095ca 394->396 397 1000962a-10009630 GetLastError 394->397 396->378 400 100095cc-100095d0 396->400 397->378 399->391 401 100095d2-100095f0 WriteFile 400->401 402 100095fe-10009601 400->402 401->397 403 100095f2-100095f6 401->403 402->379 404 10009607 402->404 403->378 405 100095f8-100095fb 403->405 404->378 405->402
                                                                                        APIs
                                                                                        • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                                        • __fassign.LIBCMT ref: 1000954F
                                                                                        • __fassign.LIBCMT ref: 1000956A
                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                        • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                                        • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 1324828854-0
                                                                                        • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                        • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                        • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                        • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 406 10003370-100033b5 call 10003330 call 100037a7 411 10003416-10003419 406->411 412 100033b7-100033c9 406->412 413 10003439-10003442 411->413 414 1000341b-10003428 call 10003790 411->414 412->413 415 100033cb 412->415 418 1000342d-10003436 call 10003330 414->418 417 100033d0-100033e7 415->417 419 100033e9-100033f7 call 10003740 417->419 420 100033fd 417->420 418->413 428 100033f9 419->428 429 1000340d-10003414 419->429 421 10003400-10003405 420->421 421->417 424 10003407-10003409 421->424 424->413 427 1000340b 424->427 427->418 430 10003443-1000344c 428->430 431 100033fb 428->431 429->418 432 10003486-10003496 call 10003774 430->432 433 1000344e-10003455 430->433 431->421 439 10003498-100034a7 call 10003790 432->439 440 100034aa-100034c6 call 10003330 call 10003758 432->440 433->432 435 10003457-10003466 call 1000bbe0 433->435 441 10003483 435->441 442 10003468-10003480 435->442 439->440 441->432 442->441
                                                                                        APIs
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                        • String ID: csm
                                                                                        • API String ID: 1170836740-1018135373
                                                                                        • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                        • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                        • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                        • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                        • _free.LIBCMT ref: 100092AB
                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                        • _free.LIBCMT ref: 100092B6
                                                                                        • _free.LIBCMT ref: 100092C1
                                                                                        • _free.LIBCMT ref: 10009315
                                                                                        • _free.LIBCMT ref: 10009320
                                                                                        • _free.LIBCMT ref: 1000932B
                                                                                        • _free.LIBCMT ref: 10009336
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                        • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                        • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                        • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 488 10008821-1000883a 489 10008850-10008855 488->489 490 1000883c-1000884c call 10009341 488->490 491 10008862-10008886 MultiByteToWideChar 489->491 492 10008857-1000885f 489->492 490->489 500 1000884e 490->500 494 10008a19-10008a2c call 10002ada 491->494 495 1000888c-10008898 491->495 492->491 497 1000889a-100088ab 495->497 498 100088ec 495->498 501 100088ca-100088db call 100056d0 497->501 502 100088ad-100088bc call 1000bf20 497->502 504 100088ee-100088f0 498->504 500->489 506 10008a0e 501->506 516 100088e1 501->516 502->506 515 100088c2-100088c8 502->515 505 100088f6-10008909 MultiByteToWideChar 504->505 504->506 505->506 509 1000890f-1000892a call 10005f19 505->509 510 10008a10-10008a17 call 10008801 506->510 509->506 520 10008930-10008937 509->520 510->494 519 100088e7-100088ea 515->519 516->519 519->504 521 10008971-1000897d 520->521 522 10008939-1000893e 520->522 524 100089c9 521->524 525 1000897f-10008990 521->525 522->510 523 10008944-10008946 522->523 523->506 526 1000894c-10008966 call 10005f19 523->526 527 100089cb-100089cd 524->527 528 10008992-100089a1 call 1000bf20 525->528 529 100089ab-100089bc call 100056d0 525->529 526->510 543 1000896c 526->543 532 10008a07-10008a0d call 10008801 527->532 533 100089cf-100089e8 call 10005f19 527->533 528->532 541 100089a3-100089a9 528->541 529->532 542 100089be 529->542 532->506 533->532 546 100089ea-100089f1 533->546 545 100089c4-100089c7 541->545 542->545 543->506 545->527 547 100089f3-100089f4 546->547 548 10008a2d-10008a33 546->548 549 100089f5-10008a05 WideCharToMultiByte 547->549 548->549 549->532 550 10008a35-10008a3c call 10008801 549->550 550->510
                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                        • __freea.LIBCMT ref: 10008A08
                                                                                          • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                        • __freea.LIBCMT ref: 10008A11
                                                                                        • __freea.LIBCMT ref: 10008A36
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1414292761-0
                                                                                        • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                        • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                        • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                        • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _strlen.LIBCMT ref: 10001607
                                                                                        • _strcat.LIBCMT ref: 1000161D
                                                                                        • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                        • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                        • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                        • String ID:
                                                                                        • API String ID: 1922816806-0
                                                                                        • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                        • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                        • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                        • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                        • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrlen$AttributesFilelstrcat
                                                                                        • String ID:
                                                                                        • API String ID: 3594823470-0
                                                                                        • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                        • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                        • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                        • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                        • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                        • String ID:
                                                                                        • API String ID: 3852720340-0
                                                                                        • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                        • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                        • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                        • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                        • _free.LIBCMT ref: 10005B2D
                                                                                        • _free.LIBCMT ref: 10005B55
                                                                                        • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                        • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                        • _abort.LIBCMT ref: 10005B74
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                        • String ID:
                                                                                        • API String ID: 3160817290-0
                                                                                        • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                        • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                        • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                        • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                          • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                          • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                          • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                          • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                        • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                          • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                          • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                        • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                        • API String ID: 4036392271-1520055953
                                                                                        • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                        • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                        • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                        • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                        • API String ID: 4061214504-1276376045
                                                                                        • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                        • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                        • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                        • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                          • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                        • _free.LIBCMT ref: 100071B8
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                        • String ID:
                                                                                        • API String ID: 336800556-0
                                                                                        • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                        • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                        • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                        • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                        • _free.LIBCMT ref: 10005BB4
                                                                                        • _free.LIBCMT ref: 10005BDB
                                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free
                                                                                        • String ID:
                                                                                        • API String ID: 3170660625-0
                                                                                        • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                        • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                        • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                        • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                        • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                                        • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                        • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                        • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: lstrlen$lstrcat
                                                                                        • String ID:
                                                                                        • API String ID: 493641738-0
                                                                                        • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                        • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                        • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                        • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 100091D0
                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                        • _free.LIBCMT ref: 100091E2
                                                                                        • _free.LIBCMT ref: 100091F4
                                                                                        • _free.LIBCMT ref: 10009206
                                                                                        • _free.LIBCMT ref: 10009218
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                        • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                        • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                        • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 1000536F
                                                                                          • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                          • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                        • _free.LIBCMT ref: 10005381
                                                                                        • _free.LIBCMT ref: 10005394
                                                                                        • _free.LIBCMT ref: 100053A5
                                                                                        • _free.LIBCMT ref: 100053B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                        • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                        • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                        • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\proof of paymentt.exe,00000104), ref: 10004C1D
                                                                                        • _free.LIBCMT ref: 10004CE8
                                                                                        • _free.LIBCMT ref: 10004CF2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _free$FileModuleName
                                                                                        • String ID: C:\Users\user\Desktop\proof of paymentt.exe
                                                                                        • API String ID: 2506810119-1240230690
                                                                                        • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                        • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                        • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                        • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                        • __freea.LIBCMT ref: 100087D5
                                                                                          • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                        • String ID:
                                                                                        • API String ID: 2652629310-0
                                                                                        • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                        • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                        • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                        • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                        • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 3177248105-0
                                                                                        • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                        • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                        • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                        • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 1000655C
                                                                                          • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                                          • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                          • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                        • String ID: *?$.
                                                                                        • API String ID: 2667617558-3972193922
                                                                                        • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                        • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                        • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                        • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strlen
                                                                                        • String ID: : $Se.
                                                                                        • API String ID: 4218353326-4089948878
                                                                                        • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                        • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                        • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                        • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                          • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000007.00000002.4460079845.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                        • Associated: 00000007.00000002.4460047209.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000007.00000002.4460079845.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_7_2_10000000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                                                        • String ID: Unknown exception
                                                                                        • API String ID: 3476068407-410509341
                                                                                        • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                        • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                        • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                        • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:10.9%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:0%
                                                                                        Total number of Nodes:314
                                                                                        Total number of Limit Nodes:15
                                                                                        execution_graph 36616 5438642 36618 5438651 36616->36618 36617 543af8f 36618->36617 36622 13e7188 36618->36622 36629 13e8770 36618->36629 36619 543b2a6 36624 13e7193 36622->36624 36623 13e8a71 36623->36619 36625 13e8a33 36624->36625 36636 13eb0e9 36624->36636 36625->36623 36640 13ed1d0 36625->36640 36645 13ed1c0 36625->36645 36631 13e87ab 36629->36631 36630 13e8a71 36630->36619 36632 13e8a33 36631->36632 36635 13eb0e9 3 API calls 36631->36635 36632->36630 36633 13ed1d0 3 API calls 36632->36633 36634 13ed1c0 3 API calls 36632->36634 36633->36630 36634->36630 36635->36632 36650 13eb118 36636->36650 36654 13eb108 36636->36654 36637 13eb0f6 36637->36625 36641 13ed1f1 36640->36641 36642 13ed215 36641->36642 36687 13ed370 36641->36687 36691 13ed380 36641->36691 36642->36623 36646 13ed1f1 36645->36646 36647 13ed215 36646->36647 36648 13ed370 3 API calls 36646->36648 36649 13ed380 3 API calls 36646->36649 36647->36623 36648->36647 36649->36647 36658 13eb210 36650->36658 36666 13eb201 36650->36666 36651 13eb127 36651->36637 36655 13eb127 36654->36655 36656 13eb210 2 API calls 36654->36656 36657 13eb201 2 API calls 36654->36657 36655->36637 36656->36655 36657->36655 36659 13eb221 36658->36659 36660 13eb244 36658->36660 36659->36660 36675 13eb4a8 36659->36675 36679 13eb499 36659->36679 36660->36651 36661 13eb448 GetModuleHandleW 36663 13eb475 36661->36663 36662 13eb23c 36662->36660 36662->36661 36663->36651 36667 13eb20a 36666->36667 36668 13eb1b5 36666->36668 36669 13eb244 36667->36669 36673 13eb4a8 LoadLibraryExW 36667->36673 36674 13eb499 LoadLibraryExW 36667->36674 36668->36651 36669->36651 36670 13eb23c 36670->36669 36671 13eb448 GetModuleHandleW 36670->36671 36672 13eb475 36671->36672 36672->36651 36673->36670 36674->36670 36676 13eb4bc 36675->36676 36678 13eb4e1 36676->36678 36683 13eac50 36676->36683 36678->36662 36680 13eb4bc 36679->36680 36681 13eac50 LoadLibraryExW 36680->36681 36682 13eb4e1 36680->36682 36681->36682 36682->36662 36684 13eb688 LoadLibraryExW 36683->36684 36686 13eb701 36684->36686 36686->36678 36688 13ed38d 36687->36688 36690 13ed3c7 36688->36690 36695 13eccb8 36688->36695 36690->36642 36692 13ed38d 36691->36692 36693 13ed3c7 36692->36693 36694 13eccb8 3 API calls 36692->36694 36693->36642 36694->36693 36696 13eccbd 36695->36696 36698 13edcd8 36696->36698 36699 13ecde4 36696->36699 36698->36698 36700 13ecdef 36699->36700 36701 13e7188 3 API calls 36700->36701 36702 13edd47 36701->36702 36702->36698 36703 543b8c0 36705 13e7188 3 API calls 36703->36705 36706 13e8770 3 API calls 36703->36706 36704 543b8d3 36705->36704 36706->36704 36707 73bb228 36708 73bb3b3 36707->36708 36710 73bb24e 36707->36710 36710->36708 36711 73b9768 36710->36711 36712 73bb4a8 PostMessageW 36711->36712 36713 73bb514 36712->36713 36713->36710 36992 5437b70 36994 5437bac 36992->36994 36993 5437bb3 36993->36993 36994->36993 36997 543afea 36994->36997 37001 543760c 36994->37001 36996 543af8f 36997->36996 36999 13e7188 3 API calls 36997->36999 37000 13e8770 3 API calls 36997->37000 36998 543b2a6 36999->36998 37000->36998 37002 5437617 37001->37002 37004 13e7188 3 API calls 37002->37004 37005 13e8770 3 API calls 37002->37005 37003 543b2a6 37003->36994 37004->37003 37005->37003 36719 139d01c 36720 139d034 36719->36720 36721 139d08e 36720->36721 36724 5430ad4 36720->36724 36733 5432c08 36720->36733 36725 5430adf 36724->36725 36726 5432c79 36725->36726 36728 5432c69 36725->36728 36755 5430bfc 36726->36755 36742 5432d90 36728->36742 36746 5432e6c 36728->36746 36751 5432da0 36728->36751 36729 5432c77 36736 5432c45 36733->36736 36734 5432c79 36735 5430bfc CallWindowProcW 36734->36735 36738 5432c77 36735->36738 36736->36734 36737 5432c69 36736->36737 36739 5432d90 CallWindowProcW 36737->36739 36740 5432da0 CallWindowProcW 36737->36740 36741 5432e6c CallWindowProcW 36737->36741 36739->36738 36740->36738 36741->36738 36744 5432d95 36742->36744 36743 5432e40 36743->36729 36759 5432e58 36744->36759 36747 5432e7a 36746->36747 36748 5432e2a 36746->36748 36750 5432e58 CallWindowProcW 36748->36750 36749 5432e40 36749->36729 36750->36749 36753 5432db4 36751->36753 36752 5432e40 36752->36729 36754 5432e58 CallWindowProcW 36753->36754 36754->36752 36756 5430c07 36755->36756 36757 543435a CallWindowProcW 36756->36757 36758 5434309 36756->36758 36757->36758 36758->36729 36760 5432e69 36759->36760 36762 5434290 36759->36762 36760->36743 36763 5430bfc CallWindowProcW 36762->36763 36764 54342aa 36763->36764 36764->36760 36765 13ed498 36766 13ed4de 36765->36766 36770 13ed678 36766->36770 36773 13ed668 36766->36773 36767 13ed5cb 36776 13ecd80 36770->36776 36774 13ed6a6 36773->36774 36775 13ecd80 DuplicateHandle 36773->36775 36774->36767 36775->36774 36777 13ed6e0 DuplicateHandle 36776->36777 36778 13ed6a6 36777->36778 36778->36767 36779 54385e4 36781 54385ef 36779->36781 36780 543af8f 36781->36780 36783 13e7188 3 API calls 36781->36783 36784 13e8770 3 API calls 36781->36784 36782 543b2a6 36783->36782 36784->36782 36785 73b80d6 36790 73ba078 36785->36790 36810 73ba0de 36785->36810 36831 73ba068 36785->36831 36786 73b80e5 36791 73ba092 36790->36791 36805 73ba09a 36791->36805 36851 73babe8 36791->36851 36856 73ba5d2 36791->36856 36861 73ba6dc 36791->36861 36866 73ba85e 36791->36866 36874 73ba47f 36791->36874 36879 73ba7d9 36791->36879 36887 73ba75b 36791->36887 36892 73ba95b 36791->36892 36897 73ba5bb 36791->36897 36902 73bac87 36791->36902 36907 73ba727 36791->36907 36912 73ba780 36791->36912 36916 73ba4e2 36791->36916 36921 73ba92d 36791->36921 36929 73baf8e 36791->36929 36934 73ba68f 36791->36934 36939 73ba48f 36791->36939 36805->36786 36811 73ba06c 36810->36811 36812 73ba0e1 36810->36812 36813 73ba5bb 2 API calls 36811->36813 36814 73ba95b 2 API calls 36811->36814 36815 73ba75b 2 API calls 36811->36815 36816 73ba7d9 4 API calls 36811->36816 36817 73ba47f 2 API calls 36811->36817 36818 73ba85e 4 API calls 36811->36818 36819 73ba6dc 2 API calls 36811->36819 36820 73ba5d2 2 API calls 36811->36820 36821 73babe8 2 API calls 36811->36821 36822 73ba48f 2 API calls 36811->36822 36823 73ba68f 2 API calls 36811->36823 36824 73baf8e 2 API calls 36811->36824 36825 73ba92d 4 API calls 36811->36825 36826 73ba09a 36811->36826 36827 73ba4e2 2 API calls 36811->36827 36828 73ba780 2 API calls 36811->36828 36829 73ba727 2 API calls 36811->36829 36830 73bac87 2 API calls 36811->36830 36812->36786 36813->36826 36814->36826 36815->36826 36816->36826 36817->36826 36818->36826 36819->36826 36820->36826 36821->36826 36822->36826 36823->36826 36824->36826 36825->36826 36826->36786 36827->36826 36828->36826 36829->36826 36830->36826 36832 73ba06c 36831->36832 36833 73ba5bb 2 API calls 36832->36833 36834 73ba95b 2 API calls 36832->36834 36835 73ba75b 2 API calls 36832->36835 36836 73ba7d9 4 API calls 36832->36836 36837 73ba47f 2 API calls 36832->36837 36838 73ba85e 4 API calls 36832->36838 36839 73ba6dc 2 API calls 36832->36839 36840 73ba5d2 2 API calls 36832->36840 36841 73babe8 2 API calls 36832->36841 36842 73ba48f 2 API calls 36832->36842 36843 73ba68f 2 API calls 36832->36843 36844 73baf8e 2 API calls 36832->36844 36845 73ba92d 4 API calls 36832->36845 36846 73ba09a 36832->36846 36847 73ba4e2 2 API calls 36832->36847 36848 73ba780 2 API calls 36832->36848 36849 73ba727 2 API calls 36832->36849 36850 73bac87 2 API calls 36832->36850 36833->36846 36834->36846 36835->36846 36836->36846 36837->36846 36838->36846 36839->36846 36840->36846 36841->36846 36842->36846 36843->36846 36844->36846 36845->36846 36846->36786 36847->36846 36848->36846 36849->36846 36850->36846 36853 73ba751 36851->36853 36852 73baeb8 36852->36805 36853->36851 36853->36852 36944 73b7238 36853->36944 36948 73b7231 36853->36948 36857 73ba5d8 36856->36857 36952 73b7188 36857->36952 36956 73b7180 36857->36956 36858 73ba5fe 36862 73ba6ee 36861->36862 36960 73b78f8 36862->36960 36964 73b78f0 36862->36964 36863 73bacb0 36867 73ba7d8 36866->36867 36867->36866 36868 73ba706 36867->36868 36872 73b7238 Wow64SetThreadContext 36867->36872 36873 73b7231 Wow64SetThreadContext 36867->36873 36870 73b78f8 ReadProcessMemory 36868->36870 36871 73b78f0 ReadProcessMemory 36868->36871 36869 73bacb0 36870->36869 36871->36869 36872->36867 36873->36867 36875 73ba4e7 36874->36875 36968 73b7a90 36875->36968 36972 73b7a84 36875->36972 36883 73b7238 Wow64SetThreadContext 36879->36883 36884 73b7231 Wow64SetThreadContext 36879->36884 36880 73ba7d8 36880->36879 36881 73ba706 36880->36881 36885 73b78f8 ReadProcessMemory 36881->36885 36886 73b78f0 ReadProcessMemory 36881->36886 36882 73bacb0 36883->36880 36884->36880 36885->36882 36886->36882 36888 73ba718 36887->36888 36890 73b78f8 ReadProcessMemory 36888->36890 36891 73b78f0 ReadProcessMemory 36888->36891 36889 73bacb0 36890->36889 36891->36889 36893 73ba961 36892->36893 36894 73bab38 36893->36894 36976 73b7800 36893->36976 36980 73b7808 36893->36980 36894->36805 36898 73ba5cc 36897->36898 36899 73bad85 36898->36899 36900 73b7808 WriteProcessMemory 36898->36900 36901 73b7800 WriteProcessMemory 36898->36901 36899->36805 36900->36898 36901->36898 36903 73bac8d 36902->36903 36904 73bacb0 36903->36904 36905 73b78f8 ReadProcessMemory 36903->36905 36906 73b78f0 ReadProcessMemory 36903->36906 36905->36904 36906->36904 36908 73ba5e9 36907->36908 36909 73ba5fe 36907->36909 36910 73b7188 ResumeThread 36908->36910 36911 73b7180 ResumeThread 36908->36911 36910->36909 36911->36909 36914 73b7808 WriteProcessMemory 36912->36914 36915 73b7800 WriteProcessMemory 36912->36915 36913 73ba5a7 36913->36805 36914->36913 36915->36913 36917 73ba4f1 36916->36917 36919 73b7a90 CreateProcessA 36917->36919 36920 73b7a84 CreateProcessA 36917->36920 36918 73ba57c 36918->36918 36919->36918 36920->36918 36923 73ba7d8 36921->36923 36922 73ba706 36925 73b78f8 ReadProcessMemory 36922->36925 36926 73b78f0 ReadProcessMemory 36922->36926 36923->36922 36927 73b7238 Wow64SetThreadContext 36923->36927 36928 73b7231 Wow64SetThreadContext 36923->36928 36924 73bacb0 36925->36924 36926->36924 36927->36923 36928->36923 36930 73ba482 36929->36930 36932 73b7a90 CreateProcessA 36930->36932 36933 73b7a84 CreateProcessA 36930->36933 36931 73ba57c 36931->36931 36932->36931 36933->36931 36935 73ba6a1 36934->36935 36984 73b7748 36935->36984 36988 73b7740 36935->36988 36936 73badb4 36940 73ba482 36939->36940 36942 73b7a90 CreateProcessA 36940->36942 36943 73b7a84 CreateProcessA 36940->36943 36941 73ba57c 36941->36941 36942->36941 36943->36941 36945 73b727d Wow64SetThreadContext 36944->36945 36947 73b72c5 36945->36947 36947->36853 36949 73b7238 Wow64SetThreadContext 36948->36949 36951 73b72c5 36949->36951 36951->36853 36953 73b71c8 ResumeThread 36952->36953 36955 73b71f9 36953->36955 36955->36858 36957 73b7188 ResumeThread 36956->36957 36959 73b71f9 36957->36959 36959->36858 36961 73b7943 ReadProcessMemory 36960->36961 36963 73b7987 36961->36963 36963->36863 36965 73b78f8 ReadProcessMemory 36964->36965 36967 73b7987 36965->36967 36967->36863 36969 73b7b19 CreateProcessA 36968->36969 36971 73b7cdb 36969->36971 36973 73b7b19 CreateProcessA 36972->36973 36975 73b7cdb 36973->36975 36977 73b7850 WriteProcessMemory 36976->36977 36979 73b78a7 36977->36979 36979->36893 36981 73b7850 WriteProcessMemory 36980->36981 36983 73b78a7 36981->36983 36983->36893 36985 73b7788 VirtualAllocEx 36984->36985 36987 73b77c5 36985->36987 36987->36936 36989 73b7788 VirtualAllocEx 36988->36989 36991 73b77c5 36989->36991 36991->36936 36714 54378dc 36715 54378e7 36714->36715 36717 13e7188 3 API calls 36715->36717 36718 13e8770 3 API calls 36715->36718 36716 543c662 36717->36716 36718->36716

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 321 7330d80-7330da8 322 7330daa 321->322 323 7330daf-7330ed6 321->323 322->323 332 7330ed8-7330ee5 323->332 333 7330e7e-7330efb 323->333 332->333 335 7330f01-733163f 333->335 336 7331425-7331467 333->336 340 733146a-733146e 336->340 341 7330fd2-7330fd6 340->341 342 7331474-733147a 340->342 344 7330feb-7330ff1 341->344 345 7330fd8-7330fe6 341->345 342->336 343 733147c-73314d7 342->343 363 73314d9-733150c 343->363 364 733150e-7331538 343->364 347 733103c-7331040 344->347 346 733106b-733109d 345->346 365 73310c7 346->365 366 733109f-73310ab 346->366 348 7330ff3-7330fff 347->348 349 7331042-7331059 347->349 353 7331001 348->353 354 7331006-733100b 348->354 351 733105b-733105e 349->351 352 733100e-7331014 349->352 358 7331061-7331065 351->358 356 7331016-733101a 352->356 357 7331039 352->357 353->354 354->352 361 733101d-733102a 356->361 357->347 358->346 362 7330fb8-7330fcf 358->362 367 7331030-7331037 361->367 368 7330f8f-7330fb3 361->368 362->341 375 7331541-73315c0 363->375 364->375 373 73310cd-73310f3 365->373 370 73310b5-73310bb 366->370 371 73310ad-73310b3 366->371 367->349 368->358 376 73310c5 370->376 371->376 381 73310f6-73310fa 373->381 389 73315c7-73315da 375->389 376->373 383 7331149-733117f 381->383 384 73310fc-7331134 381->384 383->361 388 7331185-73311fe 383->388 392 73315e9-73315ee 384->392 403 7331200 388->403 404 7331207-7331208 388->404 389->392 393 73315f0-73315fe 392->393 394 7331605-7331624 392->394 393->394 398 7330f47-7330f48 394->398 399 733162a-7331631 394->399 398->368 401 7331691-7331698 398->401 403->404 405 733125f-7331265 404->405 406 7331267-7331329 405->406 407 733120a-733122c 405->407 418 733132b-7331364 406->418 419 733136a-733136e 406->419 408 7331233-733125c 407->408 409 733122e 407->409 408->405 409->408 418->419 420 7331370-73313a9 419->420 421 73313af-73313b3 419->421 420->421 423 73313b5-73313ee 421->423 424 73313f4-73313f8 421->424 423->424 424->343 425 73313fe-7331416 424->425 425->381 427 733141c-7331423 425->427 427->340
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4']q$:$paq$~
                                                                                        • API String ID: 0-2498672421
                                                                                        • Opcode ID: 0b8815a334d1adc393d4761dc193988a72a8069cda58c3cace35ad863a8e2373
                                                                                        • Instruction ID: bd65fb594d1db95b70ca1a211945bf6bc283dcaf75704b6e4753b2167628ea49
                                                                                        • Opcode Fuzzy Hash: 0b8815a334d1adc393d4761dc193988a72a8069cda58c3cace35ad863a8e2373
                                                                                        • Instruction Fuzzy Hash: 6042E3B5A00619DFEB25CFA9C980A9DBBB2FF49304F1580E9E509AB221D731DD91DF10
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 429 7330786-733078a 430 7330ac3-7330ae9 429->430 431 7330790-7330876 429->431 434 7330aee-7330af6 430->434 442 73308a0 431->442 443 7330878-7330884 431->443 444 73308a6-7330955 442->444 445 7330886-733088c 443->445 446 733088e-7330894 443->446 454 7330957-7330963 444->454 455 733097f 444->455 447 733089e 445->447 446->447 447->444 457 7330965-733096b 454->457 458 733096d-7330973 454->458 456 7330985-73309ab 455->456 472 73309b0 call 733dac0 456->472 473 73309b0 call 733b8e8 456->473 459 733097d 457->459 458->459 459->456 461 73309b6-7330aa2 474 7330aa5 call 7331bb0 461->474 475 7330aa5 call 7331bc0 461->475 471 7330aab-7330abd call 733e9f8 471->430 472->461 473->461 474->471 475->471
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $]q$$]q$$]q$$]q
                                                                                        • API String ID: 0-858218434
                                                                                        • Opcode ID: 0869380a0af7c66a0b5e3a55bb02ce0df565a877da8b8d981905470f2d2ab559
                                                                                        • Instruction ID: a0f359ec75886bd3f9bb6cf9b1c3a1bcb1696f16d60d8df8281d5846fb91bb55
                                                                                        • Opcode Fuzzy Hash: 0869380a0af7c66a0b5e3a55bb02ce0df565a877da8b8d981905470f2d2ab559
                                                                                        • Instruction Fuzzy Hash: 31A1B774E002298FDB64DF58C990B9DBBB2FF88704F1085AAE809A7355DB359D86CF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 571 7331a30-7331a31 572 7331a33-7331a39 571->572 573 73319b5-73319b8 571->573 574 7331a3b-7331a4b 572->574 575 73319bd-73319cd 572->575 573->575 579 7331a52-7331a6a call 7330d80 574->579 580 7331a4d 574->580 576 73318f8-73319f4 575->576 588 733191a-733191b 576->588 589 73319f9-7331a00 576->589 580->579 590 7331a05-7331a0c 588->590 589->588 589->590 593 733192f-7331a18 590->593 596 7331879-733197f 593->596 597 7331948-7331950 593->597 604 733186e-7331973 596->604 605 733188c-7331890 596->605 601 7331853-7331858 597->601 602 7331956-733195a 597->602 601->588 603 733185e-733186b 601->603 602->593 606 733195c-7331a24 602->606 603->604 604->596 605->593 608 7331896-73319aa 605->608 608->576 617 73319af-73319b2 608->617 617->573
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: &$8aq
                                                                                        • API String ID: 0-4028060730
                                                                                        • Opcode ID: 9b200f87993d889e759a62940bd9d2546289d5c3baff03aa83255db775b5128e
                                                                                        • Instruction ID: c840e0a8074265624894fdd7632c837a6dcf1c4ad0e50aa57384710f51713fbc
                                                                                        • Opcode Fuzzy Hash: 9b200f87993d889e759a62940bd9d2546289d5c3baff03aa83255db775b5128e
                                                                                        • Instruction Fuzzy Hash: 4C3116F4E5560DCBEB20CFB8D5409ADBBF9EB0A350F205A25D41EFB640D6309941CB50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 647 73b7a84-73b7b25 649 73b7b5e-73b7b7e 647->649 650 73b7b27-73b7b31 647->650 655 73b7b80-73b7b8a 649->655 656 73b7bb7-73b7be6 649->656 650->649 651 73b7b33-73b7b35 650->651 652 73b7b58-73b7b5b 651->652 653 73b7b37-73b7b41 651->653 652->649 657 73b7b43 653->657 658 73b7b45-73b7b54 653->658 655->656 659 73b7b8c-73b7b8e 655->659 666 73b7be8-73b7bf2 656->666 667 73b7c1f-73b7cd9 CreateProcessA 656->667 657->658 658->658 660 73b7b56 658->660 661 73b7bb1-73b7bb4 659->661 662 73b7b90-73b7b9a 659->662 660->652 661->656 664 73b7b9e-73b7bad 662->664 665 73b7b9c 662->665 664->664 668 73b7baf 664->668 665->664 666->667 669 73b7bf4-73b7bf6 666->669 678 73b7cdb-73b7ce1 667->678 679 73b7ce2-73b7d68 667->679 668->661 671 73b7c19-73b7c1c 669->671 672 73b7bf8-73b7c02 669->672 671->667 673 73b7c06-73b7c15 672->673 674 73b7c04 672->674 673->673 676 73b7c17 673->676 674->673 676->671 678->679 689 73b7d6a-73b7d6e 679->689 690 73b7d78-73b7d7c 679->690 689->690 691 73b7d70 689->691 692 73b7d7e-73b7d82 690->692 693 73b7d8c-73b7d90 690->693 691->690 692->693 694 73b7d84 692->694 695 73b7d92-73b7d96 693->695 696 73b7da0-73b7da4 693->696 694->693 695->696 699 73b7d98 695->699 697 73b7db6-73b7dbd 696->697 698 73b7da6-73b7dac 696->698 700 73b7dbf-73b7dce 697->700 701 73b7dd4 697->701 698->697 699->696 700->701 703 73b7dd5 701->703 703->703
                                                                                        APIs
                                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073B7CC6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcess
                                                                                        • String ID:
                                                                                        • API String ID: 963392458-0
                                                                                        • Opcode ID: 64ac143692f70ffc9c36fb4dc5f1c22335ea51ba56d9fadd048f4b0b16dc7d22
                                                                                        • Instruction ID: 592ae369939a1e174958d7bb0907af7befb689ad55dbf4c4ea99ef00f67eaae2
                                                                                        • Opcode Fuzzy Hash: 64ac143692f70ffc9c36fb4dc5f1c22335ea51ba56d9fadd048f4b0b16dc7d22
                                                                                        • Instruction Fuzzy Hash: 7FA19FB1D0021ACFEB20CF68C841BEDBBB2FF84314F1485AAD908A7640DB749985CF91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 704 73b7a90-73b7b25 706 73b7b5e-73b7b7e 704->706 707 73b7b27-73b7b31 704->707 712 73b7b80-73b7b8a 706->712 713 73b7bb7-73b7be6 706->713 707->706 708 73b7b33-73b7b35 707->708 709 73b7b58-73b7b5b 708->709 710 73b7b37-73b7b41 708->710 709->706 714 73b7b43 710->714 715 73b7b45-73b7b54 710->715 712->713 716 73b7b8c-73b7b8e 712->716 723 73b7be8-73b7bf2 713->723 724 73b7c1f-73b7cd9 CreateProcessA 713->724 714->715 715->715 717 73b7b56 715->717 718 73b7bb1-73b7bb4 716->718 719 73b7b90-73b7b9a 716->719 717->709 718->713 721 73b7b9e-73b7bad 719->721 722 73b7b9c 719->722 721->721 725 73b7baf 721->725 722->721 723->724 726 73b7bf4-73b7bf6 723->726 735 73b7cdb-73b7ce1 724->735 736 73b7ce2-73b7d68 724->736 725->718 728 73b7c19-73b7c1c 726->728 729 73b7bf8-73b7c02 726->729 728->724 730 73b7c06-73b7c15 729->730 731 73b7c04 729->731 730->730 733 73b7c17 730->733 731->730 733->728 735->736 746 73b7d6a-73b7d6e 736->746 747 73b7d78-73b7d7c 736->747 746->747 748 73b7d70 746->748 749 73b7d7e-73b7d82 747->749 750 73b7d8c-73b7d90 747->750 748->747 749->750 751 73b7d84 749->751 752 73b7d92-73b7d96 750->752 753 73b7da0-73b7da4 750->753 751->750 752->753 756 73b7d98 752->756 754 73b7db6-73b7dbd 753->754 755 73b7da6-73b7dac 753->755 757 73b7dbf-73b7dce 754->757 758 73b7dd4 754->758 755->754 756->753 757->758 760 73b7dd5 758->760 760->760
                                                                                        APIs
                                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073B7CC6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcess
                                                                                        • String ID:
                                                                                        • API String ID: 963392458-0
                                                                                        • Opcode ID: fdf64c0d0a86f455217218c6b16d7428bf5cdbeaf6d0b2205a34ee9aebd4220a
                                                                                        • Instruction ID: 58fe55becaaf258f35a08b62bb717001a008a248ee8dce54427527be0a6e3d1d
                                                                                        • Opcode Fuzzy Hash: fdf64c0d0a86f455217218c6b16d7428bf5cdbeaf6d0b2205a34ee9aebd4220a
                                                                                        • Instruction Fuzzy Hash: C3918EB1D0021ACFEB24DF68C841BEDBBB2FF84314F1485AAD909A7650DB749985CF91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 761 13eb210-13eb21f 762 13eb24b-13eb24f 761->762 763 13eb221-13eb22e call 13e8760 761->763 765 13eb263-13eb2a4 762->765 766 13eb251-13eb25b 762->766 769 13eb244 763->769 770 13eb230 763->770 772 13eb2a6-13eb2ae 765->772 773 13eb2b1-13eb2bf 765->773 766->765 769->762 820 13eb236 call 13eb4a8 770->820 821 13eb236 call 13eb499 770->821 772->773 774 13eb2e3-13eb2e5 773->774 775 13eb2c1-13eb2c6 773->775 780 13eb2e8-13eb2ef 774->780 777 13eb2c8-13eb2cf call 13eabf4 775->777 778 13eb2d1 775->778 776 13eb23c-13eb23e 776->769 779 13eb380-13eb39e 776->779 782 13eb2d3-13eb2e1 777->782 778->782 796 13eb3a6-13eb3f8 779->796 783 13eb2fc-13eb303 780->783 784 13eb2f1-13eb2f9 780->784 782->780 785 13eb305-13eb30d 783->785 786 13eb310-13eb319 call 13eac04 783->786 784->783 785->786 792 13eb31b-13eb323 786->792 793 13eb326-13eb32b 786->793 792->793 794 13eb32d-13eb334 793->794 795 13eb349-13eb34d 793->795 794->795 797 13eb336-13eb346 call 13eac14 call 13eac24 794->797 818 13eb350 call 13eb7a8 795->818 819 13eb350 call 13eb780 795->819 811 13eb3fa-13eb440 796->811 797->795 800 13eb353-13eb356 802 13eb358-13eb376 800->802 803 13eb379-13eb37f 800->803 802->803 813 13eb448-13eb473 GetModuleHandleW 811->813 814 13eb442-13eb445 811->814 815 13eb47c-13eb490 813->815 816 13eb475-13eb47b 813->816 814->813 816->815 818->800 819->800 820->776 821->776
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 013EB466
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 4139908857-0
                                                                                        • Opcode ID: ce46627f19c3a581d14984a6c0f75fc9465714211f42488af081b44dd8f89525
                                                                                        • Instruction ID: dbc625f5150eea671a78d56f52f7e2da73dcb8573a13b0701afda66f46c8a881
                                                                                        • Opcode Fuzzy Hash: ce46627f19c3a581d14984a6c0f75fc9465714211f42488af081b44dd8f89525
                                                                                        • Instruction Fuzzy Hash: EE815770A00B158FDB25DF6AD14875ABBF5FF48308F008A2DD48ADBA94DB75E845CB90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 822 5430bfc-54342fc 826 5434302-5434307 822->826 827 54343ac-54343cc call 5430ad4 822->827 828 543435a-5434392 CallWindowProcW 826->828 829 5434309-5434340 826->829 834 54343cf-54343dc 827->834 831 5434394-543439a 828->831 832 543439b-54343aa 828->832 837 5434342-5434348 829->837 838 5434349-5434358 829->838 831->832 832->834 837->838 838->834
                                                                                        APIs
                                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05434381
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2069330564.0000000005430000.00000040.00000800.00020000.00000000.sdmp, Offset: 05430000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_5430000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallProcWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2714655100-0
                                                                                        • Opcode ID: 11fd08456ace2a73f19e57b7268297a47c68ff5f52161cdc1d6e1a7cbcd9dd99
                                                                                        • Instruction ID: 1a7974cb84cbe70d26dd5c44ec0f299f80fe0f74be365a25f6a72532315925e2
                                                                                        • Opcode Fuzzy Hash: 11fd08456ace2a73f19e57b7268297a47c68ff5f52161cdc1d6e1a7cbcd9dd99
                                                                                        • Instruction Fuzzy Hash: 6041F8B5A002098FCB14DF99C489AEAFBF5FF88314F24C559D519AB361D774A841CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 840 13e450c-13e5f51 CreateActCtxA 843 13e5f5a-13e5fb4 840->843 844 13e5f53-13e5f59 840->844 851 13e5fb6-13e5fb9 843->851 852 13e5fc3-13e5fc7 843->852 844->843 851->852 853 13e5fd8 852->853 854 13e5fc9-13e5fd5 852->854 856 13e5fd9 853->856 854->853 856->856
                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 013E5F41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: 0acf97785d3d280881e5b289b40bbacd378989ceeb239b2e43544d7cb8d5ee55
                                                                                        • Instruction ID: 13c2e49e7de1e089ecbe288262bd3d8d7c47b3bbadfd839384e5e0dea33320bf
                                                                                        • Opcode Fuzzy Hash: 0acf97785d3d280881e5b289b40bbacd378989ceeb239b2e43544d7cb8d5ee55
                                                                                        • Instruction Fuzzy Hash: D841B2B5C00719CBDB24DFA9C888B9DBBF5FF45308F20806AD408AB255DB75694ACF91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 857 13e5e85-13e5f51 CreateActCtxA 859 13e5f5a-13e5fb4 857->859 860 13e5f53-13e5f59 857->860 867 13e5fb6-13e5fb9 859->867 868 13e5fc3-13e5fc7 859->868 860->859 867->868 869 13e5fd8 868->869 870 13e5fc9-13e5fd5 868->870 872 13e5fd9 869->872 870->869 872->872
                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 013E5F41
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: e460b5407ad9abd5794f4b8e25bf8f49157083a5cd10a73ed43da61791af7c2b
                                                                                        • Instruction ID: a70aad9d0197df86e1c0b7d21d451516e21a03f4821a6c26e5e43b07758e5ca0
                                                                                        • Opcode Fuzzy Hash: e460b5407ad9abd5794f4b8e25bf8f49157083a5cd10a73ed43da61791af7c2b
                                                                                        • Instruction Fuzzy Hash: 9E41C2B5C00719CEDB24CFA9C984B9DBBF5FF49308F20806AD408AB255DB75594ACF91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073B7898
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3559483778-0
                                                                                        • Opcode ID: ab4f5501940df64e29d4461083453b9f18fcb685c251dc175eef4cecfc8d08c7
                                                                                        • Instruction ID: b6604371a84a7308e24f4fbdb96294f550839f9f516184d803ad88288bbc1269
                                                                                        • Opcode Fuzzy Hash: ab4f5501940df64e29d4461083453b9f18fcb685c251dc175eef4cecfc8d08c7
                                                                                        • Instruction Fuzzy Hash: 252146B19003499FDB10CFA9C885BEEBBF1FF88314F10842AE519A7250C7789945CBA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073B7898
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3559483778-0
                                                                                        • Opcode ID: 07b1923f0bb077d6c3c38e78e7aec64acc6e9467b88ed546044a43efa0a1078b
                                                                                        • Instruction ID: dfecbd2492e2673c7993bacf3c1a7a50015bc5df9c06829cd6659d8e3b3023c6
                                                                                        • Opcode Fuzzy Hash: 07b1923f0bb077d6c3c38e78e7aec64acc6e9467b88ed546044a43efa0a1078b
                                                                                        • Instruction Fuzzy Hash: 102139B5D003499FDB10DFAAC885BEEBBF5FF48310F10842AE919A7250D7789944CBA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073B7978
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessRead
                                                                                        • String ID:
                                                                                        • API String ID: 1726664587-0
                                                                                        • Opcode ID: 06626de556d4f5ea96bb2aafd4db9a5a438a108a426346f1fccdf33d80c0644e
                                                                                        • Instruction ID: 6f3ec7beebef28dbbacb54d244d13ad31890d8e073e3f435d61e354a3f607313
                                                                                        • Opcode Fuzzy Hash: 06626de556d4f5ea96bb2aafd4db9a5a438a108a426346f1fccdf33d80c0644e
                                                                                        • Instruction Fuzzy Hash: A42128B18002499FDB10DFAAC880AEEFBF5FF48310F50842AE959A7250D7789945CBA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,013ED6A6,?,?,?,?,?), ref: 013ED767
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: DuplicateHandle
                                                                                        • String ID:
                                                                                        • API String ID: 3793708945-0
                                                                                        • Opcode ID: 8867807341d0503cb5edb1ed971b8497ad2d4752b83bbdf1ee9cbfbf62e7f7f9
                                                                                        • Instruction ID: 2d7f5d4cae8515cb61ceb9c9f72ca80ae5001a35208849a9ad66987ecb831f46
                                                                                        • Opcode Fuzzy Hash: 8867807341d0503cb5edb1ed971b8497ad2d4752b83bbdf1ee9cbfbf62e7f7f9
                                                                                        • Instruction Fuzzy Hash: 0621E3B59003589FDB10CFAAD584AEEBBF8EB48314F14841AE918A7350D378A944CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,013ED6A6,?,?,?,?,?), ref: 013ED767
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: DuplicateHandle
                                                                                        • String ID:
                                                                                        • API String ID: 3793708945-0
                                                                                        • Opcode ID: 2c72baab4b8ca6c56074f2655cbf26db4944349d401fcb04180b30a1183362fb
                                                                                        • Instruction ID: bdbff8a77ffd97b34f05b23b1e124ccd2d99f1bc87af6a1e0e83c7bd83040575
                                                                                        • Opcode Fuzzy Hash: 2c72baab4b8ca6c56074f2655cbf26db4944349d401fcb04180b30a1183362fb
                                                                                        • Instruction Fuzzy Hash: 3521E5B59002589FDB10CFAAD984ADEBFF9EB48310F14841AE958A3350D378A945CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073B72B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: ContextThreadWow64
                                                                                        • String ID:
                                                                                        • API String ID: 983334009-0
                                                                                        • Opcode ID: 43fa6dfb7dae6e60ed5a50635ebc06c217ddf7ffa244cb2311d4b01c6ebd75e6
                                                                                        • Instruction ID: ce255b5ebea6bd73572ae50a784f15cc66a0976f74be5ab986f9481a7c7ddacc
                                                                                        • Opcode Fuzzy Hash: 43fa6dfb7dae6e60ed5a50635ebc06c217ddf7ffa244cb2311d4b01c6ebd75e6
                                                                                        • Instruction Fuzzy Hash: A52157B1D002098FDB10DFAAC4847EEBBF5EF88324F14842AD559A7241CB789985CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073B72B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: ContextThreadWow64
                                                                                        • String ID:
                                                                                        • API String ID: 983334009-0
                                                                                        • Opcode ID: d01180ff7757f52193424239bc275644d9ba4f8dcdfec8b8497dcbfdc0364506
                                                                                        • Instruction ID: 7b5b16fc0090f76c3746e96d85497b13dedbbd534c8d73a3d20ea34c232a7e10
                                                                                        • Opcode Fuzzy Hash: d01180ff7757f52193424239bc275644d9ba4f8dcdfec8b8497dcbfdc0364506
                                                                                        • Instruction Fuzzy Hash: 6C2138B1D002098FDB10DFAAC4857EEBBF5EF88314F14842AD519A7341CB789944CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073B7978
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessRead
                                                                                        • String ID:
                                                                                        • API String ID: 1726664587-0
                                                                                        • Opcode ID: 54ff1966eb86b3dc93f79d269ed4ae48f0fb8f897634262079a40c3d8525429e
                                                                                        • Instruction ID: ccf0b78fe1b3b90a1d4ad3cb830805f275281006a9861d1147b963e0c80aafeb
                                                                                        • Opcode Fuzzy Hash: 54ff1966eb86b3dc93f79d269ed4ae48f0fb8f897634262079a40c3d8525429e
                                                                                        • Instruction Fuzzy Hash: 312107B1C003599FDB10DFAAC885AEEFBF5FF48310F50842AE519A7250D7789945CBA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,013EB4E1,00000800,00000000,00000000), ref: 013EB6F2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 1029625771-0
                                                                                        • Opcode ID: 3c153f9457e5c69f228f89916c6169ee2bd55b87cbefd5fa57a40436d0820a2a
                                                                                        • Instruction ID: 684ab7aa057c9a47687c374384cb0565339d65663b77b7fa4d8f24b6046b5f84
                                                                                        • Opcode Fuzzy Hash: 3c153f9457e5c69f228f89916c6169ee2bd55b87cbefd5fa57a40436d0820a2a
                                                                                        • Instruction Fuzzy Hash: 111126B68003498FDB10DF9AC448ADEFBF4EB58324F10842AD519B7650C3B9A544CFA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,013EB4E1,00000800,00000000,00000000), ref: 013EB6F2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad
                                                                                        • String ID:
                                                                                        • API String ID: 1029625771-0
                                                                                        • Opcode ID: f2ecff13e33daaeee89c7e3e553f6a4ac7ed82060c8716a1f7c0cb146b6b6c05
                                                                                        • Instruction ID: 36475d410389670914124745d49d6b0733080a51fbb535d60ba22969e511fa8b
                                                                                        • Opcode Fuzzy Hash: f2ecff13e33daaeee89c7e3e553f6a4ac7ed82060c8716a1f7c0cb146b6b6c05
                                                                                        • Instruction Fuzzy Hash: 971144B68003498FDB10CF9AD448ADEFFF4EF58314F14841AD519A7650C378A544CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073B77B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 56b312b63488b139fb8a892592e4ddb3d7c6b6d13e9472a1cc33515c39ab3598
                                                                                        • Instruction ID: ebb71595987cdc94f61ca4207c8cb9e79d361159bf0b9d9b304484a429e6fba9
                                                                                        • Opcode Fuzzy Hash: 56b312b63488b139fb8a892592e4ddb3d7c6b6d13e9472a1cc33515c39ab3598
                                                                                        • Instruction Fuzzy Hash: 0F116AB59002499FDB20DFA9C845BEEBFF5FF88314F24841AE559A7250C7799540CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073B77B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 6218e30249d6499ae8731b8e3b79332e19210c374d01fb629b521c6b802836ef
                                                                                        • Instruction ID: 0e42339027166468b0143ba853bb3d59302572783ca9362d08c7067ca58c0061
                                                                                        • Opcode Fuzzy Hash: 6218e30249d6499ae8731b8e3b79332e19210c374d01fb629b521c6b802836ef
                                                                                        • Instruction Fuzzy Hash: 031137B58002499FDB20DFAAC845AEEBFF5EF88314F10841AE519A7250C779A940CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: 72fba8132e1ce2b15aa6e95a0ce26a8e366f0de9266013215d142793a225f679
                                                                                        • Instruction ID: e945dcfe99fa89e338230896ca5d544c7200e4d09f27f82e73a31791c0285613
                                                                                        • Opcode Fuzzy Hash: 72fba8132e1ce2b15aa6e95a0ce26a8e366f0de9266013215d142793a225f679
                                                                                        • Instruction Fuzzy Hash: E31179B18003488FDB20DFAAC8447EEFBF4EF88320F20841AD519A7240C778A940CFA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: b44aa1294e3bef44eff3e5a80c0d7048cc26e89a5dbd9e1ac012471635210273
                                                                                        • Instruction ID: 5e94b99c703a40aeba1775a83e78fa1d1154149e24b1ac08f7d239145ae3534a
                                                                                        • Opcode Fuzzy Hash: b44aa1294e3bef44eff3e5a80c0d7048cc26e89a5dbd9e1ac012471635210273
                                                                                        • Instruction Fuzzy Hash: 4D113AB1D002498FDB20DFAAC8457EEFBF5EF89314F20841AD519A7650CB79A944CFA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 073BB505
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost
                                                                                        • String ID:
                                                                                        • API String ID: 410705778-0
                                                                                        • Opcode ID: 1a2432603cee3f03fc3e8669db02fa613c0b7685d56833a9fe5b7806c392b8b5
                                                                                        • Instruction ID: 74c624363e82cb0b73971aaa340cb9a0fe9ff1abb2f96aea81536b8d3deebc56
                                                                                        • Opcode Fuzzy Hash: 1a2432603cee3f03fc3e8669db02fa613c0b7685d56833a9fe5b7806c392b8b5
                                                                                        • Instruction Fuzzy Hash: BE1136B58003499FDB10CF99C484BDEFFF8EB48320F10840AD558A7611C375A984CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 013EB466
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064948663.00000000013E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013E0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_13e0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 4139908857-0
                                                                                        • Opcode ID: cf5c72fc9f194f0e20d78760f7117c8890fd4c559c9d6d87c66f89c96e8aa8f5
                                                                                        • Instruction ID: d6293487e28f26defb3cb35fb3f5b6713b1e4c6caf677f75c2ed2e21b83d9e42
                                                                                        • Opcode Fuzzy Hash: cf5c72fc9f194f0e20d78760f7117c8890fd4c559c9d6d87c66f89c96e8aa8f5
                                                                                        • Instruction Fuzzy Hash: 3A110FB5C003598FDB10DF9AC448A9EFBF4EB89314F10841AD518B7654C379A545CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 073BB505
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070547821.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_73b0000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost
                                                                                        • String ID:
                                                                                        • API String ID: 410705778-0
                                                                                        • Opcode ID: 3c7283795069927928f3407beb238b340c86f2a4ed43d301f09e37dc4ab9c5b9
                                                                                        • Instruction ID: d1aab7c17f9b38f930ed53c7ddb7556f8ff84787e41913ac693f609c1b56672e
                                                                                        • Opcode Fuzzy Hash: 3c7283795069927928f3407beb238b340c86f2a4ed43d301f09e37dc4ab9c5b9
                                                                                        • Instruction Fuzzy Hash: DE11F5B58003499FDB20DF99C485BDEFBF8EB59314F10841AE518A7610C375A944CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 8aq
                                                                                        • API String ID: 0-538729646
                                                                                        • Opcode ID: d4d41a36b8421f6a5d814be2537d2be8f87a82706f840af6678dad52a052251e
                                                                                        • Instruction ID: ebda70e7506f281743299462ec38844995efed1d52b2dc4dce4e4088800372df
                                                                                        • Opcode Fuzzy Hash: d4d41a36b8421f6a5d814be2537d2be8f87a82706f840af6678dad52a052251e
                                                                                        • Instruction Fuzzy Hash: 0C51E1B4E1561DDFDB10CFA9D4809ADBBFAEB0A310F10952AE41AAB350E7309942CF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 8aq
                                                                                        • API String ID: 0-538729646
                                                                                        • Opcode ID: 82bbfa666962f7ce47645bea5b99c6beb6119f5c128c757b22058cf0e661f1f2
                                                                                        • Instruction ID: 4ab5a2a36e2691019a781e8b02654847c222831f2fd8b9b0290a31b3737574a8
                                                                                        • Opcode Fuzzy Hash: 82bbfa666962f7ce47645bea5b99c6beb6119f5c128c757b22058cf0e661f1f2
                                                                                        • Instruction Fuzzy Hash: 7E5103B4E1561D9FDB10CFA9D5809ADBBF5FB0A310F10992AE41AEB350E7309942CF51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: 911603c2e6af2de610fd84f71eeae923b72d7e202fc3a25f2462989e0d4d65ce
                                                                                        • Instruction ID: 159fa59e9477b485743d7589d70af80fb6726065771a1a23a3514cbe5240bdd7
                                                                                        • Opcode Fuzzy Hash: 911603c2e6af2de610fd84f71eeae923b72d7e202fc3a25f2462989e0d4d65ce
                                                                                        • Instruction Fuzzy Hash: F7518171B0021A8FDB14EFB9D8949AFBBF6EFC8224B158929E419D7390DF309C058761
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Te]q
                                                                                        • API String ID: 0-52440209
                                                                                        • Opcode ID: c666e5330afbd52b619aba1cf19cc808f4c91c636d52aba7ef426d3f9813544e
                                                                                        • Instruction ID: 3f3f01771e43c00a02a9ee3c01f874f857b12b46d7376883beec77215e9f3dcd
                                                                                        • Opcode Fuzzy Hash: c666e5330afbd52b619aba1cf19cc808f4c91c636d52aba7ef426d3f9813544e
                                                                                        • Instruction Fuzzy Hash: 5D1151B1F0021A8BDB14EBB999115EEB6F6AFC5715B10407AC509EB384EF358D02D7A1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: '
                                                                                        • API String ID: 0-1997036262
                                                                                        • Opcode ID: 7c78c0b2d3570e753d4d9c64f652b2c8155fb8a92d55133c9e09b489eb4e1394
                                                                                        • Instruction ID: 3e4de97f807d6caa030d99b111efdf99a525b906211eb1e3cc461aeed337f408
                                                                                        • Opcode Fuzzy Hash: 7c78c0b2d3570e753d4d9c64f652b2c8155fb8a92d55133c9e09b489eb4e1394
                                                                                        • Instruction Fuzzy Hash: CAE0CDE041F54CD6F311DB70DA1A7693EA85302216F045548D40D025A1CFB55E44E653
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: '
                                                                                        • API String ID: 0-1997036262
                                                                                        • Opcode ID: 3259850cc7e968ee2477c92d0dd9c183f65dd67ee0540197db4a0e640a109955
                                                                                        • Instruction ID: 2ec9a4d9374295c180f06108b7e5cd9d17ea9580edaa235f6c4a3f7ef36fb899
                                                                                        • Opcode Fuzzy Hash: 3259850cc7e968ee2477c92d0dd9c183f65dd67ee0540197db4a0e640a109955
                                                                                        • Instruction Fuzzy Hash: C2D0A7F045B20CD6E320D664D40AA6E76AC9702212F041544D40D135508AB16E50D567
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ca5a742b2d895b134837f6310c8446866850ba61e43a534b0ccf1359f307d8eb
                                                                                        • Instruction ID: 08d6f1ed47153a7d447928c493509345db48b6c1ae4d87bc04cd019f24ad7b9a
                                                                                        • Opcode Fuzzy Hash: ca5a742b2d895b134837f6310c8446866850ba61e43a534b0ccf1359f307d8eb
                                                                                        • Instruction Fuzzy Hash: 9D51D6B4E54219DFEB25DFA9C48099EBBF5FF49310F108529E81AAB351D730A942CF50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 535b9b87e5ee94d20cffe49d3b8922044be94612d25c3dc7d4eb80effb737cac
                                                                                        • Instruction ID: 714ae93d93e889d4a8a183397081b23e56f9630f91b47d3623c365288a18e4ed
                                                                                        • Opcode Fuzzy Hash: 535b9b87e5ee94d20cffe49d3b8922044be94612d25c3dc7d4eb80effb737cac
                                                                                        • Instruction Fuzzy Hash: BB51F4B4E052189FDB05EFA9D884AAEBBF6FB89310F109515F805B7358CB349845CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8c2980b5ceb6d336f6d4931a4557c7a52086f024e1b9158442416b8a418162c0
                                                                                        • Instruction ID: 6d0bf8c4748319ce066c70f683a1495f9041e37e458a577b8195912ba900aa39
                                                                                        • Opcode Fuzzy Hash: 8c2980b5ceb6d336f6d4931a4557c7a52086f024e1b9158442416b8a418162c0
                                                                                        • Instruction Fuzzy Hash: 6D41DF74E112199FDB00DFA8D484AEEBBB1FB48321F109559E814B7354DB35A994CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 99aa04381ee5f90d14b0840932cf8d025ba56a7474bbe2c35a8e99856594c662
                                                                                        • Instruction ID: 266185c2310233b55c0ae8096a74c258189bece489b4b94c4b1a53aaa8b89b6a
                                                                                        • Opcode Fuzzy Hash: 99aa04381ee5f90d14b0840932cf8d025ba56a7474bbe2c35a8e99856594c662
                                                                                        • Instruction Fuzzy Hash: 2D51B5B8E002188FEB64DF68C890BDDBBB2FB49314F1085A9E409A7355D7359E81CF51
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 007f55899faf94bbb7662049378558a5e930acc46b45aee7e1bc4dac8b4437ed
                                                                                        • Instruction ID: ab828c8badec4ae5a5c6a57ad522b47e1d89cca0e19962870b358c5785c1d156
                                                                                        • Opcode Fuzzy Hash: 007f55899faf94bbb7662049378558a5e930acc46b45aee7e1bc4dac8b4437ed
                                                                                        • Instruction Fuzzy Hash: F731F8F8E1560EDFDB10DFA9D5809EEBBF9EB49201F149525E80AE7304E73099418F60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e006ffe8675cefaa0b6b9178edc09d619f823a12ad073addc34c93fed8e98737
                                                                                        • Instruction ID: 25db40d611dfdd10c8620c020dbdd1e332eb0a912a0113fafd3bc39c857dc2f9
                                                                                        • Opcode Fuzzy Hash: e006ffe8675cefaa0b6b9178edc09d619f823a12ad073addc34c93fed8e98737
                                                                                        • Instruction Fuzzy Hash: F4311AB8E1560EDFDB10CFA9D9805AEBBF5FB4D201F149929E809E7310E73499018F60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bd809fdeff975a93e9560d21bc0dd31aa72f53f1ffea05029848db822f4392c4
                                                                                        • Instruction ID: ee04b489153e7f63842283ff5b0cc7d3e531e03c2307b7f20621c05581007abd
                                                                                        • Opcode Fuzzy Hash: bd809fdeff975a93e9560d21bc0dd31aa72f53f1ffea05029848db822f4392c4
                                                                                        • Instruction Fuzzy Hash: 1C315AB5A10209AFDB10DFA9D884ADEBFF9EF49310F10842AE909E7310D7749950CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 86b88db11957c691799aacbacf40a3d60caf879c967377b562b1cf7da3d12d7c
                                                                                        • Instruction ID: 1b474cd2aed97fa6641a861c6d8f7f0d96900cf99fe1c24d9057a94697ef4100
                                                                                        • Opcode Fuzzy Hash: 86b88db11957c691799aacbacf40a3d60caf879c967377b562b1cf7da3d12d7c
                                                                                        • Instruction Fuzzy Hash: 6F314AB4E002199FDB01EF98D880AEEBBB5FF88310F109565E904BB354DB709A41CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d7a118713a98bb7dec50656f13f84dd86f859622d19f7bcaa2b7628e36247901
                                                                                        • Instruction ID: 26ffa416cf552f80203475195ff1a61ed59900e464667c051dd27c006f24cfa6
                                                                                        • Opcode Fuzzy Hash: d7a118713a98bb7dec50656f13f84dd86f859622d19f7bcaa2b7628e36247901
                                                                                        • Instruction Fuzzy Hash: A12171B1D093588FE719CF6AC85169EBFB7EFC6300F05C06BD4489B265DA344906CB11
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064732966.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_139d000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d46fcc6bd8618ea4c17d99761e870fa3881d37e174ee45518b78864202cfeb9e
                                                                                        • Instruction ID: a81fb7bf65210b4211987df15047d72ed11f5d7853b5b3ed7caf2ed102ecaf5c
                                                                                        • Opcode Fuzzy Hash: d46fcc6bd8618ea4c17d99761e870fa3881d37e174ee45518b78864202cfeb9e
                                                                                        • Instruction Fuzzy Hash: D7212271604204DFDF15DFA8D985B26BF69FB88358F20C56DD90A0B356C33AD807CA61
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 13fc8b63e99423cd7709c2ca711661d3fcf5e1e7bc2f11eecba99fd7e50e6f5e
                                                                                        • Instruction ID: 49e2e44e6746e58a9f0ea87eb8dd24dcb49c519c86c834d90ae496bf5ac876f4
                                                                                        • Opcode Fuzzy Hash: 13fc8b63e99423cd7709c2ca711661d3fcf5e1e7bc2f11eecba99fd7e50e6f5e
                                                                                        • Instruction Fuzzy Hash: 31310474E11508DFD704DF9AE284A99BBF1FF88310B6281D4E8489B329EB30AE14DF11
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8d160ccb128e91e6eba83d6f5f65c55cc1c4a5e28f3bf6cbaec566f331c21b87
                                                                                        • Instruction ID: 981c6a27fc818848c988ed0e556e732f073f932c173a9c4300dfb0b9f8c37937
                                                                                        • Opcode Fuzzy Hash: 8d160ccb128e91e6eba83d6f5f65c55cc1c4a5e28f3bf6cbaec566f331c21b87
                                                                                        • Instruction Fuzzy Hash: 5D2128B8E1960D9FDB10DFA9D4505EEBBF5EB4A300F10946AE45AB7701D7319901CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c6b01e7a5b9ae4397d511907a25d92d7f992b0376ab6d7cb378af27d40fdb50a
                                                                                        • Instruction ID: 802d2d4ed2e1c1e151edab509147f0e3c03714fa4bdd1be0197a6ea734bc3a28
                                                                                        • Opcode Fuzzy Hash: c6b01e7a5b9ae4397d511907a25d92d7f992b0376ab6d7cb378af27d40fdb50a
                                                                                        • Instruction Fuzzy Hash: 8431D4B0D01218DFEB20DF99C584BDDBFF5AB48314F64901AE408BB290C7B95845CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 45ce8e70edc2bde67e632c4854bcf8e2f71f4dba6c89491f483bff84c5a4efa0
                                                                                        • Instruction ID: 460e10fbf2f966eb46ce8e9663c48f2d8010e92bae53b4adbd80c6f5d1a4343e
                                                                                        • Opcode Fuzzy Hash: 45ce8e70edc2bde67e632c4854bcf8e2f71f4dba6c89491f483bff84c5a4efa0
                                                                                        • Instruction Fuzzy Hash: DC21D3B4E1561D9BDB10DFA9D5809EEFBF9EB4A210F10942AE81AB7700D73099418BA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 64cf0cf20e4ffbf90fa34c7080dc29da5ec24af9b61e979d8d7a17d992dccdc6
                                                                                        • Instruction ID: 35c4014fd272ae7e15851e4d29a62f53f3761a4ead8030d3b1cc863121fa39af
                                                                                        • Opcode Fuzzy Hash: 64cf0cf20e4ffbf90fa34c7080dc29da5ec24af9b61e979d8d7a17d992dccdc6
                                                                                        • Instruction Fuzzy Hash: 9A316471822A1CC6E310AF51F05A2657F79F744365F866A88F0E4051ADDF7A04B8CB7A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5d4e26ccfba4fdbee723a0b5ac502a17e43996f07a82317a2f1891a8b459c66a
                                                                                        • Instruction ID: 50b929d4e347bacf3e07ccf5657d22923037b4b4da5e17718ec4db16824f53f6
                                                                                        • Opcode Fuzzy Hash: 5d4e26ccfba4fdbee723a0b5ac502a17e43996f07a82317a2f1891a8b459c66a
                                                                                        • Instruction Fuzzy Hash: 851106B1B083889FDB05DB748D156AA7FF99F46204F1404EAD809C7242EE308D028B21
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5794eb136bdf966a857a0f587feedd12f7d175b7f47e2498dcda64a749153c50
                                                                                        • Instruction ID: c79fdbdb39eecab06d7c9ae3df2e83d69f799b74f4a24eba1c2dc5c547cb436f
                                                                                        • Opcode Fuzzy Hash: 5794eb136bdf966a857a0f587feedd12f7d175b7f47e2498dcda64a749153c50
                                                                                        • Instruction Fuzzy Hash: 242112B59143499FCB20CF9AD884ADEBBF8FB48310F10841AE918A7310C378A954CFA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064732966.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_139d000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                        • Instruction ID: c678ebef28e8d3bdbebb5f9d4359464ab95109f847344505840eb45d3b9de74d
                                                                                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                        • Instruction Fuzzy Hash: 5111DD75504280CFDB12CF58D5C4B15FFA2FB88318F24C6AAD8494B756C33AD40ACBA2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4764836e8e137fa51198e8a6c876125e0dc4bdeb0ba1852f9d00f17b2406ceb9
                                                                                        • Instruction ID: 4ea35462b203ae59ce2f904efcff0e6cad91608dd09df5b1348e90e2591c8a61
                                                                                        • Opcode Fuzzy Hash: 4764836e8e137fa51198e8a6c876125e0dc4bdeb0ba1852f9d00f17b2406ceb9
                                                                                        • Instruction Fuzzy Hash: 9D11CEB5E056188BEB18CFABC94059EFBF7AFC9300F14C02A9808AB358DB315906CB40
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 237dc3c4557cb131b4e42a8a9297658d311b7f64419f5752c16c10f6748b9f01
                                                                                        • Instruction ID: 0ecc9b3bff868368c157e6355290c4f79319b783d709bb66ee150e2c66f71460
                                                                                        • Opcode Fuzzy Hash: 237dc3c4557cb131b4e42a8a9297658d311b7f64419f5752c16c10f6748b9f01
                                                                                        • Instruction Fuzzy Hash: DB11F374A2160CDFC740DF99E085999BFB0FB48320F5294C4E884A7329DB30DAA4CB61
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064646243.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_138d000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ab0dbc6aefc555410e4a98a6f9e17a6f6aa9a7f5f0bfa366dfca08f8c886d869
                                                                                        • Instruction ID: 53a84602a1dbca42f59bcc5d359d243c7bffdca1d7b5e493705b29eee9a9dd8b
                                                                                        • Opcode Fuzzy Hash: ab0dbc6aefc555410e4a98a6f9e17a6f6aa9a7f5f0bfa366dfca08f8c886d869
                                                                                        • Instruction Fuzzy Hash: 8F01A7710053849AE710BFA9CD84B66BF9CEF55329F18C42AFD094A6D7C2799840CA75
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2064646243.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_138d000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0ceef697814e6664a51ff8e4c28eb90b15adddfa9df348182dcc3131f0b233ec
                                                                                        • Instruction ID: c535cc92f1300e9cb9be5ed9126064239c4fb0c17f6866bd4549698e22810a62
                                                                                        • Opcode Fuzzy Hash: 0ceef697814e6664a51ff8e4c28eb90b15adddfa9df348182dcc3131f0b233ec
                                                                                        • Instruction Fuzzy Hash: DCF0C272004384AEE7109F1AC884B66FFD8EF91338F18C45AFD080A2C3C2799840CA70
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6a6053d07c9d22352a2b977ed01ce618bdc6b4bd986f406d4c48d3ae4d89a750
                                                                                        • Instruction ID: 70ee5e370da6b1ab2b8f7bef9b7ec62905cb0512aaa4a3bb7b6eb60036f2ac7c
                                                                                        • Opcode Fuzzy Hash: 6a6053d07c9d22352a2b977ed01ce618bdc6b4bd986f406d4c48d3ae4d89a750
                                                                                        • Instruction Fuzzy Hash: F201FFB0800219DFEB24CF69C4043EE7AF5BF45351F108125E828AA1D0D7744A80CFE0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3a390765e751a3ba30cd38fe3d52fde86550c6369b54dd15b0d597104ad90516
                                                                                        • Instruction ID: 2f36ae93743d117fb0fb8addf63c8f0dd932b90333ec1181ca3a3c15cd5530a4
                                                                                        • Opcode Fuzzy Hash: 3a390765e751a3ba30cd38fe3d52fde86550c6369b54dd15b0d597104ad90516
                                                                                        • Instruction Fuzzy Hash: 4BE039727002286F93049AAED894C6BBBEDFBCCA74361807AE508C7310DA319C01C6A0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0a230a32a76f9ef81056e50e8164f768bce6275f9f2c90c19d7f6888b8daa9ff
                                                                                        • Instruction ID: a9efeec6afb54efb93ed9e16866fe2003faffea49cc8dfd5444ca8f9b9526ac9
                                                                                        • Opcode Fuzzy Hash: 0a230a32a76f9ef81056e50e8164f768bce6275f9f2c90c19d7f6888b8daa9ff
                                                                                        • Instruction Fuzzy Hash: 84E092B045E3C89FD7279770AC267693F788B03216F0859C6E449878A3CE784D58E763
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f34216f56a9a44af94a3c52cf799de99bdffa1c3571e57f364a4d5fb64586936
                                                                                        • Instruction ID: e1fbc84b0523dd21b859e94c61abb124a957f713cfcdb09614ad0373d4fe6022
                                                                                        • Opcode Fuzzy Hash: f34216f56a9a44af94a3c52cf799de99bdffa1c3571e57f364a4d5fb64586936
                                                                                        • Instruction Fuzzy Hash: B9E09AB480920CEBCB06DFA4D9019ACBF75EB49320F10C199FC4913310CA329A61EB80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5252997a5dfa268b4f86e212bcab8448e4c7058294a395044f1614975c19d249
                                                                                        • Instruction ID: bc19b782f15d234a32d3e8da9cc366f373d00ea32b817842e37b9fce9b28e5bd
                                                                                        • Opcode Fuzzy Hash: 5252997a5dfa268b4f86e212bcab8448e4c7058294a395044f1614975c19d249
                                                                                        • Instruction Fuzzy Hash: 57E0E5B0E5A118DFEB24CF60E941BADB7BABB46208F1055D5D80E63A51CB308E81DF10
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0241d21f79ac630d2ed5032d705dc4d9535f7c1673097886b685c80cfc985937
                                                                                        • Instruction ID: bfd9f2fbf6138c2046570b8dea57cbe1b5eee7ad23abb3b52a3a54a60db362b3
                                                                                        • Opcode Fuzzy Hash: 0241d21f79ac630d2ed5032d705dc4d9535f7c1673097886b685c80cfc985937
                                                                                        • Instruction Fuzzy Hash: 51E04F7491910CEBCB05DFA8D9419ACBF75EB49320F14C199EC4817351CA329A61EB90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e29f5fc00242fbdcb61ff127c4c7c8d2c48abe301b87979a281cd65364d7d61c
                                                                                        • Instruction ID: 472a04829fed35be87ff3b3ed205bbd8ef0e4f6ef64d685aa8f92b4339e6c6c0
                                                                                        • Opcode Fuzzy Hash: e29f5fc00242fbdcb61ff127c4c7c8d2c48abe301b87979a281cd65364d7d61c
                                                                                        • Instruction Fuzzy Hash: F2E04FB181610CDFD710DBF4890459EBBE89B09211F145995A00983110EE364A00DAB2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: df8aca8222acb484d99b7b01ad3d150070591cf735a00002c91627dce2a1903e
                                                                                        • Instruction ID: c027dca2113f7871cd5e54cd71377c1b3cab5dcd876abb0a14120fe00a9e4fc4
                                                                                        • Opcode Fuzzy Hash: df8aca8222acb484d99b7b01ad3d150070591cf735a00002c91627dce2a1903e
                                                                                        • Instruction Fuzzy Hash: C7E086B491910CEFC708DFA4D5419ACBF78EB45311F10C1A9EC4817341DB329E52DB90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 32b30f05686f2a1a9e800579be8347f4b80e4bfa1c4eac8745249fe19ca39c58
                                                                                        • Instruction ID: 2564c736da545f5117d837c5bb200ff8168dab50c7ac2cb1c2107b61e7990f5e
                                                                                        • Opcode Fuzzy Hash: 32b30f05686f2a1a9e800579be8347f4b80e4bfa1c4eac8745249fe19ca39c58
                                                                                        • Instruction Fuzzy Hash: DDE08CB491910CDFCB08DFA4D5419ACBBB8AB46310F10C1A8A80863341CA329E02DB80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3f07d3c52b1b631efcd583102c797a1777cdb5f577662dfc72ca75d61b50d6bf
                                                                                        • Instruction ID: cb247695ee869ac59647fc671b946093dc854f896ff659b98cbafa95047e5991
                                                                                        • Opcode Fuzzy Hash: 3f07d3c52b1b631efcd583102c797a1777cdb5f577662dfc72ca75d61b50d6bf
                                                                                        • Instruction Fuzzy Hash: 4FD0A7F099E20CEFD328DBA5E41ABAD7B6DD703329F005544A40D139508F715E80DBA2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 488ba927df86a58c685f4115265d6f117456e4263880f3a49ced592eaed92489
                                                                                        • Instruction ID: 974df5501988583cdb21c3572bd3577b014d61d4a7f95bd4fc5d26d83980a34e
                                                                                        • Opcode Fuzzy Hash: 488ba927df86a58c685f4115265d6f117456e4263880f3a49ced592eaed92489
                                                                                        • Instruction Fuzzy Hash: A8D0A7F066B50CD6E370E664D805BADB6ACC743312F805444A40E135508AB11E50DA62
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9c32cbd613f4e3e3ce1d3eae948f3a703d094f97270c3d2b1b7ece3ee3bedcc1
                                                                                        • Instruction ID: eb239d081ed13ca53641b9b2aa3e61927ef57aade83262f234fb05290c9a18bf
                                                                                        • Opcode Fuzzy Hash: 9c32cbd613f4e3e3ce1d3eae948f3a703d094f97270c3d2b1b7ece3ee3bedcc1
                                                                                        • Instruction Fuzzy Hash: 44D0A77056E94D4EE3125764AC193B83F84270332AF09550CE08C424FBCF648008CA62
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d54d7197352a9dad1eb907e1087a1cc30ff313e95e1c805fb05625b1c7802ec5
                                                                                        • Instruction ID: 5f13f06a25b6a6f9c3a1b280c7d9d17e03af42ea71830d8ecc171020a3ebe921
                                                                                        • Opcode Fuzzy Hash: d54d7197352a9dad1eb907e1087a1cc30ff313e95e1c805fb05625b1c7802ec5
                                                                                        • Instruction Fuzzy Hash: 2CC08CB142BA0C8AD62022A4A1093B03BDC1303222F402404E00D0043A8F608014D566
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9ff6cbd2a4a15c257bfb653703231914b7dc21c9b2e63f188083dadb7b1e9c06
                                                                                        • Instruction ID: 6d7f906e468e30f90240400adcc10e8d2a38520b26157ca586e43cf800439e1e
                                                                                        • Opcode Fuzzy Hash: 9ff6cbd2a4a15c257bfb653703231914b7dc21c9b2e63f188083dadb7b1e9c06
                                                                                        • Instruction Fuzzy Hash: 05C09B7462A2119BD604C744D88187CF765EB4A704B24D145D81D47743C733E90389C5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000009.00000002.2070281727.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_9_2_7330000_mQpdTSxCjbPop.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c3fe00e4ff84f805323dc20573a2cc8497aee9dd045f18a059f45f3e5d3790c2
                                                                                        • Instruction ID: 93714cb7f8c9a87895faa0b31088948bf0d9b53bb6d33f92352ee12b9b2c7256
                                                                                        • Opcode Fuzzy Hash: c3fe00e4ff84f805323dc20573a2cc8497aee9dd045f18a059f45f3e5d3790c2
                                                                                        • Instruction Fuzzy Hash: 23C04CF4E25268CFAB24CFB0D40445D7A75BA05305B241929D407A3702DB3045018E15
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:1.2%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:2.2%
                                                                                        Total number of Nodes:544
                                                                                        Total number of Limit Nodes:14
                                                                                        execution_graph 47110 434887 47111 434893 ___scrt_is_nonwritable_in_current_image 47110->47111 47136 434596 47111->47136 47113 43489a 47115 4348c3 47113->47115 47431 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47113->47431 47123 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47115->47123 47432 444251 5 API calls ___crtLCMapStringA 47115->47432 47117 4348dc 47119 4348e2 ___scrt_is_nonwritable_in_current_image 47117->47119 47433 4441f5 5 API calls ___crtLCMapStringA 47117->47433 47120 434962 47147 434b14 47120->47147 47123->47120 47434 4433e7 35 API calls 6 library calls 47123->47434 47131 43498e 47133 434997 47131->47133 47435 4433c2 28 API calls _Atexit 47131->47435 47436 43470d 13 API calls 2 library calls 47133->47436 47137 43459f 47136->47137 47437 434c52 IsProcessorFeaturePresent 47137->47437 47139 4345ab 47438 438f31 10 API calls 4 library calls 47139->47438 47141 4345b0 47142 4345b4 47141->47142 47439 4440bf 47141->47439 47142->47113 47145 4345cb 47145->47113 47455 436e90 47147->47455 47150 434968 47151 4441a2 47150->47151 47457 44f059 47151->47457 47153 4441ab 47154 434971 47153->47154 47461 446815 35 API calls 47153->47461 47156 40e9c5 47154->47156 47463 41cb50 LoadLibraryA GetProcAddress 47156->47463 47158 40e9e1 GetModuleFileNameW 47468 40f3c3 47158->47468 47160 40e9fd 47483 4020f6 47160->47483 47163 4020f6 28 API calls 47164 40ea1b 47163->47164 47489 41be1b 47164->47489 47168 40ea2d 47515 401e8d 47168->47515 47170 40ea36 47171 40ea93 47170->47171 47172 40ea49 47170->47172 47521 401e65 22 API calls 47171->47521 47545 40fbb3 116 API calls 47172->47545 47175 40ea5b 47546 401e65 22 API calls 47175->47546 47176 40eaa3 47522 401e65 22 API calls 47176->47522 47178 40ea67 47547 410f37 36 API calls __EH_prolog 47178->47547 47180 40eac2 47523 40531e 28 API calls 47180->47523 47183 40ead1 47524 406383 28 API calls 47183->47524 47184 40ea79 47548 40fb64 77 API calls 47184->47548 47187 40eadd 47525 401fe2 47187->47525 47188 40ea82 47549 40f3b0 70 API calls 47188->47549 47194 401fd8 11 API calls 47196 40eefb 47194->47196 47195 401fd8 11 API calls 47197 40eafb 47195->47197 47426 4432f6 GetModuleHandleW 47196->47426 47537 401e65 22 API calls 47197->47537 47199 40eb04 47538 401fc0 28 API calls 47199->47538 47201 40eb0f 47539 401e65 22 API calls 47201->47539 47203 40eb28 47540 401e65 22 API calls 47203->47540 47205 40eb43 47206 40ebae 47205->47206 47550 406c1e 28 API calls 47205->47550 47541 401e65 22 API calls 47206->47541 47209 40eb70 47210 401fe2 28 API calls 47209->47210 47211 40eb7c 47210->47211 47212 401fd8 11 API calls 47211->47212 47215 40eb85 47212->47215 47213 40ec02 47542 40d069 47213->47542 47214 40ebbb 47214->47213 47552 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47214->47552 47551 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47215->47551 47217 40ec08 47218 40ea8b 47217->47218 47554 41b2c3 33 API calls 47217->47554 47218->47194 47221 40eba4 47221->47206 47223 40f34f 47221->47223 47637 4139a9 30 API calls 47223->47637 47224 40ec23 47226 40ec76 47224->47226 47555 407716 RegOpenKeyExA RegQueryValueExA RegCloseKey 47224->47555 47225 40ebe6 47225->47213 47553 4139a9 30 API calls 47225->47553 47560 401e65 22 API calls 47226->47560 47231 40ec7f 47239 40ec90 47231->47239 47240 40ec8b 47231->47240 47232 40ec3e 47234 40ec42 47232->47234 47235 40ec4c 47232->47235 47233 40f365 47638 412475 65 API calls ___scrt_fastfail 47233->47638 47556 407738 30 API calls 47234->47556 47558 401e65 22 API calls 47235->47558 47562 401e65 22 API calls 47239->47562 47561 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47240->47561 47241 40ec47 47557 407260 97 API calls 47241->47557 47243 40f37f 47640 413a23 RegOpenKeyExW RegDeleteValueW 47243->47640 47247 40ec99 47563 41bc5e 28 API calls 47247->47563 47248 40ec55 47248->47226 47253 40ec71 47248->47253 47251 40eca4 47564 401f13 28 API calls 47251->47564 47559 407260 97 API calls 47253->47559 47254 40f392 47641 401f09 11 API calls 47254->47641 47255 40ecaf 47565 401f09 11 API calls 47255->47565 47259 40f39c 47642 401f09 11 API calls 47259->47642 47260 40ecb8 47566 401e65 22 API calls 47260->47566 47263 40f3a5 47643 40dd42 27 API calls 47263->47643 47264 40ecc1 47567 401e65 22 API calls 47264->47567 47266 40f3aa 47644 414f2a 167 API calls _strftime 47266->47644 47270 40ecdb 47568 401e65 22 API calls 47270->47568 47272 40ecf5 47569 401e65 22 API calls 47272->47569 47274 40ed80 47277 40ed8a 47274->47277 47283 40ef06 ___scrt_fastfail 47274->47283 47275 40ed0e 47275->47274 47570 401e65 22 API calls 47275->47570 47278 40ed93 47277->47278 47285 40ee0f 47277->47285 47576 401e65 22 API calls 47278->47576 47280 40ed9c 47577 401e65 22 API calls 47280->47577 47281 40ed23 _wcslen 47281->47274 47571 401e65 22 API calls 47281->47571 47587 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 47283->47587 47284 40edae 47578 401e65 22 API calls 47284->47578 47308 40ee0a ___scrt_fastfail 47285->47308 47287 40ed3e 47572 401e65 22 API calls 47287->47572 47291 40edc0 47579 401e65 22 API calls 47291->47579 47292 40ed53 47573 40da34 31 API calls 47292->47573 47293 40ef51 47588 401e65 22 API calls 47293->47588 47297 40ede9 47580 401e65 22 API calls 47297->47580 47298 40ef76 47589 402093 28 API calls 47298->47589 47299 40ed66 47574 401f13 28 API calls 47299->47574 47302 40ed72 47575 401f09 11 API calls 47302->47575 47304 40ef88 47590 41376f 14 API calls 47304->47590 47306 40edfa 47581 40cdf9 45 API calls _wcslen 47306->47581 47307 40ed7b 47307->47274 47308->47285 47582 413947 31 API calls 47308->47582 47312 40ef9e 47591 401e65 22 API calls 47312->47591 47313 40eea3 ctype 47583 401e65 22 API calls 47313->47583 47315 40efaa 47592 43baac 39 API calls _strftime 47315->47592 47318 40efb7 47320 40efe4 47318->47320 47593 41cd9b 86 API calls ___scrt_fastfail 47318->47593 47319 40eeba 47319->47293 47584 401e65 22 API calls 47319->47584 47594 402093 28 API calls 47320->47594 47322 40eed7 47585 41bc5e 28 API calls 47322->47585 47324 40efc8 CreateThread 47324->47320 47755 41d45d 10 API calls 47324->47755 47327 40eff9 47595 402093 28 API calls 47327->47595 47328 40eee3 47586 40f474 103 API calls 47328->47586 47331 40f008 47596 41b4ef 79 API calls 47331->47596 47332 40eee8 47332->47293 47334 40eeef 47332->47334 47334->47218 47335 40f00d 47597 401e65 22 API calls 47335->47597 47337 40f019 47598 401e65 22 API calls 47337->47598 47339 40f02b 47599 401e65 22 API calls 47339->47599 47341 40f04b 47600 43baac 39 API calls _strftime 47341->47600 47343 40f058 47601 401e65 22 API calls 47343->47601 47345 40f063 47602 401e65 22 API calls 47345->47602 47347 40f074 47603 401e65 22 API calls 47347->47603 47349 40f089 47604 401e65 22 API calls 47349->47604 47351 40f09a 47352 40f0a1 StrToIntA 47351->47352 47605 409de4 169 API calls _wcslen 47352->47605 47354 40f0b3 47606 401e65 22 API calls 47354->47606 47356 40f101 47615 401e65 22 API calls 47356->47615 47357 40f0bc 47357->47356 47607 4344ea 47357->47607 47362 40f0e4 47363 40f0eb CreateThread 47362->47363 47363->47356 47750 419fb4 102 API calls 2 library calls 47363->47750 47364 40f159 47617 401e65 22 API calls 47364->47617 47365 40f111 47365->47364 47367 4344ea new 22 API calls 47365->47367 47368 40f126 47367->47368 47616 401e65 22 API calls 47368->47616 47370 40f138 47373 40f13f CreateThread 47370->47373 47371 40f1cc 47623 401e65 22 API calls 47371->47623 47372 40f162 47372->47371 47618 401e65 22 API calls 47372->47618 47373->47364 47756 419fb4 102 API calls 2 library calls 47373->47756 47376 40f17e 47619 401e65 22 API calls 47376->47619 47377 40f1d5 47378 40f21a 47377->47378 47624 401e65 22 API calls 47377->47624 47628 41b60d 79 API calls 47378->47628 47382 40f193 47620 40d9e8 31 API calls 47382->47620 47383 40f223 47629 401f13 28 API calls 47383->47629 47384 40f1ea 47625 401e65 22 API calls 47384->47625 47387 40f22e 47630 401f09 11 API calls 47387->47630 47389 40f1a6 47621 401f13 28 API calls 47389->47621 47391 40f1ff 47626 43baac 39 API calls _strftime 47391->47626 47393 40f237 CreateThread 47396 40f264 47393->47396 47397 40f258 CreateThread 47393->47397 47751 40f7a7 120 API calls 47393->47751 47394 40f1b2 47622 401f09 11 API calls 47394->47622 47399 40f279 47396->47399 47400 40f26d CreateThread 47396->47400 47397->47396 47752 4120f7 137 API calls 47397->47752 47404 40f2cc 47399->47404 47631 402093 28 API calls 47399->47631 47400->47399 47753 4126db 38 API calls ___scrt_fastfail 47400->47753 47402 40f1bb CreateThread 47402->47371 47754 401be9 49 API calls _strftime 47402->47754 47403 40f20c 47627 40c162 7 API calls 47403->47627 47633 4134ff RegOpenKeyExA RegQueryValueExA RegCloseKey 47404->47633 47407 40f29c 47632 4052fd 28 API calls 47407->47632 47410 40f2e4 47410->47263 47634 41bc5e 28 API calls 47410->47634 47416 40f2fd 47635 41361b 31 API calls 47416->47635 47420 40f313 47636 401f09 11 API calls 47420->47636 47422 40f346 DeleteFileW 47423 40f34d 47422->47423 47424 40f31e 47422->47424 47639 41bc5e 28 API calls 47423->47639 47424->47422 47424->47423 47425 40f334 Sleep 47424->47425 47425->47424 47427 434984 47426->47427 47427->47131 47428 44341f 47427->47428 47758 44319c 47428->47758 47431->47113 47432->47117 47433->47123 47434->47120 47435->47133 47436->47119 47437->47139 47438->47141 47443 44fb68 47439->47443 47442 438f5a 8 API calls 3 library calls 47442->47142 47446 44fb81 47443->47446 47445 4345bd 47445->47145 47445->47442 47447 434fcb 47446->47447 47448 434fd6 IsProcessorFeaturePresent 47447->47448 47449 434fd4 47447->47449 47451 435018 47448->47451 47449->47445 47454 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47451->47454 47453 4350fb 47453->47445 47454->47453 47456 434b27 GetStartupInfoW 47455->47456 47456->47150 47458 44f06b 47457->47458 47459 44f062 47457->47459 47458->47153 47462 44ef58 48 API calls 4 library calls 47459->47462 47461->47153 47462->47458 47464 41cb8f LoadLibraryA GetProcAddress 47463->47464 47465 41cb7f GetModuleHandleA GetProcAddress 47463->47465 47466 41cbb8 44 API calls 47464->47466 47467 41cba8 LoadLibraryA GetProcAddress 47464->47467 47465->47464 47466->47158 47467->47466 47645 41b4a8 FindResourceA 47468->47645 47472 40f3ed _Yarn 47655 4020b7 47472->47655 47475 401fe2 28 API calls 47476 40f413 47475->47476 47477 401fd8 11 API calls 47476->47477 47478 40f41c 47477->47478 47479 43bd51 ___std_exception_copy 21 API calls 47478->47479 47480 40f42d _Yarn 47479->47480 47661 406dd8 47480->47661 47482 40f460 47482->47160 47484 40210c 47483->47484 47485 4023ce 11 API calls 47484->47485 47486 402126 47485->47486 47487 402569 28 API calls 47486->47487 47488 402134 47487->47488 47488->47163 47698 4020df 47489->47698 47491 401fd8 11 API calls 47492 41bed0 47491->47492 47494 401fd8 11 API calls 47492->47494 47493 41bea0 47714 4041a2 28 API calls 47493->47714 47497 41bed8 47494->47497 47499 401fd8 11 API calls 47497->47499 47498 41beac 47500 401fe2 28 API calls 47498->47500 47502 40ea24 47499->47502 47503 41beb5 47500->47503 47501 401fe2 28 API calls 47507 41be2e 47501->47507 47511 40fb17 47502->47511 47504 401fd8 11 API calls 47503->47504 47506 41bebd 47504->47506 47505 401fd8 11 API calls 47505->47507 47508 41ce34 28 API calls 47506->47508 47507->47493 47507->47501 47507->47505 47510 41be9e 47507->47510 47702 4041a2 28 API calls 47507->47702 47703 41ce34 47507->47703 47508->47510 47510->47491 47512 40fb23 47511->47512 47513 40fb2a 47511->47513 47740 402163 11 API calls 47512->47740 47513->47168 47516 402163 47515->47516 47517 40219f 47516->47517 47741 402730 11 API calls 47516->47741 47517->47170 47519 402184 47742 402712 11 API calls std::_Deallocate 47519->47742 47521->47176 47522->47180 47523->47183 47524->47187 47526 401ff1 47525->47526 47533 402039 47525->47533 47527 4023ce 11 API calls 47526->47527 47528 401ffa 47527->47528 47529 40203c 47528->47529 47531 402015 47528->47531 47744 40267a 11 API calls 47529->47744 47743 403098 28 API calls 47531->47743 47534 401fd8 47533->47534 47535 4023ce 11 API calls 47534->47535 47536 401fe1 47535->47536 47536->47195 47537->47199 47538->47201 47539->47203 47540->47205 47541->47214 47745 401fab 47542->47745 47544 40d073 CreateMutexA GetLastError 47544->47217 47545->47175 47546->47178 47547->47184 47548->47188 47550->47209 47551->47221 47552->47225 47553->47213 47554->47224 47555->47232 47556->47241 47557->47235 47558->47248 47559->47226 47560->47231 47561->47239 47562->47247 47563->47251 47564->47255 47565->47260 47566->47264 47567->47270 47568->47272 47569->47275 47570->47281 47571->47287 47572->47292 47573->47299 47574->47302 47575->47307 47576->47280 47577->47284 47578->47291 47579->47297 47580->47306 47581->47308 47582->47313 47583->47319 47584->47322 47585->47328 47586->47332 47587->47293 47588->47298 47589->47304 47590->47312 47591->47315 47592->47318 47593->47324 47594->47327 47595->47331 47596->47335 47597->47337 47598->47339 47599->47341 47600->47343 47601->47345 47602->47347 47603->47349 47604->47351 47605->47354 47606->47357 47613 4344ef 47607->47613 47608 43bd51 ___std_exception_copy 21 API calls 47608->47613 47609 40f0d1 47614 401e65 22 API calls 47609->47614 47613->47608 47613->47609 47746 442f80 7 API calls 2 library calls 47613->47746 47747 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47613->47747 47748 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47613->47748 47614->47362 47615->47365 47616->47370 47617->47372 47618->47376 47619->47382 47620->47389 47621->47394 47622->47402 47623->47377 47624->47384 47625->47391 47626->47403 47627->47378 47628->47383 47629->47387 47630->47393 47631->47407 47633->47410 47634->47416 47635->47420 47636->47424 47637->47233 47639->47243 47640->47254 47641->47259 47642->47263 47643->47266 47749 41ad17 104 API calls 47644->47749 47646 41b4c5 LoadResource LockResource SizeofResource 47645->47646 47647 40f3de 47645->47647 47646->47647 47648 43bd51 47647->47648 47653 446137 __Getctype 47648->47653 47649 446175 47665 4405dd 20 API calls __dosmaperr 47649->47665 47651 446160 RtlAllocateHeap 47652 446173 47651->47652 47651->47653 47652->47472 47653->47649 47653->47651 47664 442f80 7 API calls 2 library calls 47653->47664 47656 4020bf 47655->47656 47666 4023ce 47656->47666 47658 4020ca 47670 40250a 47658->47670 47660 4020d9 47660->47475 47662 4020b7 28 API calls 47661->47662 47663 406dec 47662->47663 47663->47482 47664->47653 47665->47652 47667 402428 47666->47667 47668 4023d8 47666->47668 47667->47658 47668->47667 47677 4027a7 11 API calls std::_Deallocate 47668->47677 47671 40251a 47670->47671 47672 402520 47671->47672 47673 402535 47671->47673 47678 402569 47672->47678 47688 4028e8 28 API calls 47673->47688 47676 402533 47676->47660 47677->47667 47689 402888 47678->47689 47680 40257d 47681 402592 47680->47681 47682 4025a7 47680->47682 47694 402a34 22 API calls 47681->47694 47696 4028e8 28 API calls 47682->47696 47685 40259b 47695 4029da 22 API calls 47685->47695 47687 4025a5 47687->47676 47688->47676 47690 402890 47689->47690 47691 402898 47690->47691 47697 402ca3 22 API calls 47690->47697 47691->47680 47694->47685 47695->47687 47696->47687 47699 4020e7 47698->47699 47700 4023ce 11 API calls 47699->47700 47701 4020f2 47700->47701 47701->47507 47702->47507 47704 41ce41 47703->47704 47705 41cea0 47704->47705 47709 41ce51 47704->47709 47706 41ceba 47705->47706 47707 41cfe0 28 API calls 47705->47707 47724 41d146 28 API calls 47706->47724 47707->47706 47711 41ce89 47709->47711 47715 41cfe0 47709->47715 47723 41d146 28 API calls 47711->47723 47713 41ce9c 47713->47507 47714->47498 47717 41cfe8 47715->47717 47716 41d01a 47716->47711 47717->47716 47718 41d01e 47717->47718 47721 41d002 47717->47721 47735 402725 22 API calls 47718->47735 47725 41d051 47721->47725 47723->47713 47724->47713 47726 41d05b __EH_prolog 47725->47726 47736 402717 22 API calls 47726->47736 47728 41d06e 47737 41d15d 11 API calls 47728->47737 47730 41d094 47731 41d0cc 47730->47731 47738 402730 11 API calls 47730->47738 47731->47716 47733 41d0b3 47739 402712 11 API calls std::_Deallocate 47733->47739 47736->47728 47737->47730 47738->47733 47739->47731 47740->47513 47741->47519 47742->47517 47743->47533 47744->47533 47746->47613 47757 4127ee 61 API calls 47752->47757 47759 4431a8 _Atexit 47758->47759 47760 4431c0 47759->47760 47761 4432f6 _Atexit GetModuleHandleW 47759->47761 47780 445888 EnterCriticalSection 47760->47780 47763 4431b4 47761->47763 47763->47760 47792 44333a GetModuleHandleExW 47763->47792 47764 443266 47781 4432a6 47764->47781 47768 44323d 47771 443255 47768->47771 47801 4441f5 5 API calls ___crtLCMapStringA 47768->47801 47769 443283 47784 4432b5 47769->47784 47770 4432af 47803 457729 5 API calls ___crtLCMapStringA 47770->47803 47802 4441f5 5 API calls ___crtLCMapStringA 47771->47802 47772 4431c8 47772->47764 47772->47768 47800 443f50 20 API calls _Atexit 47772->47800 47780->47772 47804 4458d0 LeaveCriticalSection 47781->47804 47783 44327f 47783->47769 47783->47770 47805 448cc9 47784->47805 47787 4432e3 47790 44333a _Atexit 8 API calls 47787->47790 47788 4432c3 GetPEB 47788->47787 47789 4432d3 GetCurrentProcess TerminateProcess 47788->47789 47789->47787 47791 4432eb ExitProcess 47790->47791 47793 443364 GetProcAddress 47792->47793 47794 443387 47792->47794 47795 443379 47793->47795 47796 443396 47794->47796 47797 44338d FreeLibrary 47794->47797 47795->47794 47798 434fcb ___crtLCMapStringA 5 API calls 47796->47798 47797->47796 47799 4433a0 47798->47799 47799->47760 47800->47768 47801->47771 47802->47764 47804->47783 47806 448ce4 47805->47806 47807 448cee 47805->47807 47809 434fcb ___crtLCMapStringA 5 API calls 47806->47809 47811 4484ca 47807->47811 47810 4432bf 47809->47810 47810->47787 47810->47788 47812 4484f6 47811->47812 47813 4484fa 47811->47813 47812->47813 47817 44851a 47812->47817 47818 448566 47812->47818 47813->47806 47815 448526 GetProcAddress 47816 448536 __crt_fast_encode_pointer 47815->47816 47816->47813 47817->47813 47817->47815 47819 448587 LoadLibraryExW 47818->47819 47824 44857c 47818->47824 47820 4485a4 GetLastError 47819->47820 47821 4485bc 47819->47821 47820->47821 47822 4485af LoadLibraryExW 47820->47822 47823 4485d3 FreeLibrary 47821->47823 47821->47824 47822->47821 47823->47824 47824->47812 47825 404e26 WaitForSingleObject 47826 404e40 SetEvent FindCloseChangeNotification 47825->47826 47827 404e57 closesocket 47825->47827 47828 404ed8 47826->47828 47829 404e64 47827->47829 47830 404e7a 47829->47830 47838 4050e4 83 API calls 47829->47838 47832 404e8c WaitForSingleObject 47830->47832 47833 404ece SetEvent CloseHandle 47830->47833 47839 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47832->47839 47833->47828 47835 404e9b SetEvent WaitForSingleObject 47840 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47835->47840 47837 404eb3 SetEvent CloseHandle CloseHandle 47837->47833 47838->47830 47839->47835 47840->47837 47841 448299 GetLastError 47842 4482b2 47841->47842 47843 4482b8 47841->47843 47867 4487bc 11 API calls 2 library calls 47842->47867 47848 44830f SetLastError 47843->47848 47860 445af3 47843->47860 47847 4482d2 47868 446782 20 API calls _free 47847->47868 47849 448318 47848->47849 47852 4482e7 47852->47847 47854 4482ee 47852->47854 47853 4482d8 47855 448306 SetLastError 47853->47855 47870 448087 20 API calls __dosmaperr 47854->47870 47855->47849 47857 4482f9 47871 446782 20 API calls _free 47857->47871 47859 4482ff 47859->47848 47859->47855 47865 445b00 __Getctype 47860->47865 47861 445b40 47873 4405dd 20 API calls __dosmaperr 47861->47873 47862 445b2b RtlAllocateHeap 47863 445b3e 47862->47863 47862->47865 47863->47847 47869 448812 11 API calls 2 library calls 47863->47869 47865->47861 47865->47862 47872 442f80 7 API calls 2 library calls 47865->47872 47867->47843 47868->47853 47869->47852 47870->47857 47871->47859 47872->47865 47873->47863 47874 40165e 47875 401666 47874->47875 47876 401669 47874->47876 47877 4016a8 47876->47877 47879 401696 47876->47879 47878 4344ea new 22 API calls 47877->47878 47881 40169c 47878->47881 47880 4344ea new 22 API calls 47879->47880 47880->47881

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                                        • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                                        • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                                        • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                                        • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                                        • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                                        • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                                        • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                                        • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                                        • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                                        • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                                                                        • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                                                                        • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                                                                        • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                                                                        • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                        • API String ID: 4236061018-3687161714
                                                                                        • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                                        • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                                        • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                                        • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 488 4432b5-4432c1 call 448cc9 491 4432e3-4432ef call 44333a ExitProcess 488->491 492 4432c3-4432d1 GetPEB 488->492 492->491 493 4432d3-4432dd GetCurrentProcess TerminateProcess 492->493 493->491
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG,00446136,00000003), ref: 004432D6
                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 004432DD
                                                                                        • ExitProcess.KERNEL32 ref: 004432EF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 1703294689-263838557
                                                                                        • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                                        • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                                        • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                                        • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 101 40f34f-40f36a call 401fab call 4139a9 call 412475 69->101 80 40ec03 call 40d069 70->80 81 40ebcb-40ebea call 401fab call 413549 70->81 86 40ec08-40ec0a 80->86 81->80 97 40ebec-40ec02 call 401fab call 4139a9 81->97 89 40ec13-40ec1a 86->89 90 40ec0c-40ec0e 86->90 95 40ec1c 89->95 96 40ec1e-40ec2a call 41b2c3 89->96 94 40eef1 90->94 94->49 95->96 103 40ec33-40ec37 96->103 104 40ec2c-40ec2e 96->104 97->80 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 101->126 107 40ec76-40ec89 call 401e65 call 401fab 103->107 108 40ec39-40ec40 call 407716 103->108 104->103 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->127 128 40ec8b call 407755 107->128 120 40ec42-40ec47 call 407738 call 407260 108->120 121 40ec4c-40ec5f call 401e65 call 401fab 108->121 120->121 121->107 140 40ec61-40ec67 121->140 157 40f3a5-40f3af call 40dd42 call 414f2a 126->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 140->107 143 40ec69-40ec6f 140->143 143->107 147 40ec71 call 407260 143->147 147->107 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 205 40ed35-40ed39 call 401e65 178->205 236 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->236 184 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->184 185 40ee0f-40ee19 call 409057 181->185 191 40ee1e-40ee42 call 40247c call 434798 184->191 185->191 212 40ee51 191->212 213 40ee44-40ee4f call 436e90 191->213 214 40ed3e-40ed7b call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 205->214 218 40ee53-40eec8 call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 call 4347a1 call 401e65 call 40b9bd 212->218 213->218 214->177 218->236 286 40eece-40eeed call 401e65 call 41bc5e call 40f474 218->286 287 40efc1 236->287 288 40efdc-40efde 236->288 286->236 306 40eeef 286->306 292 40efc3-40efda call 41cd9b CreateThread 287->292 289 40efe0-40efe2 288->289 290 40efe4 288->290 289->292 293 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 290->293 292->293 344 40f101 293->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 293->345 306->94 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 357 40f159-40f16c call 401e65 call 401fab 347->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->358 368 40f1cc-40f1df call 401e65 call 401fab 357->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 402 40f240 380->402 403 40f243-40f256 CreateThread 380->403 402->403 404 40f264-40f26b 403->404 405 40f258-40f262 CreateThread 403->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2e7 call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 416->157 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 416->427 418->416 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                                                        APIs
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                                          • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                                          • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                                          • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe,00000104), ref: 0040E9EE
                                                                                          • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                        • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                        • API String ID: 2830904901-3975421309
                                                                                        • Opcode ID: 9b1241e9863c6c72b945d3650d91b2d8199091da366b898b2edbbd996a0c1519
                                                                                        • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                                        • Opcode Fuzzy Hash: 9b1241e9863c6c72b945d3650d91b2d8199091da366b898b2edbbd996a0c1519
                                                                                        • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                                                        • SetEvent.KERNEL32(?), ref: 00404E43
                                                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                                                                        • closesocket.WS2_32(?), ref: 00404E5A
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                                                                        • SetEvent.KERNEL32(?), ref: 00404EA2
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                                                                        • SetEvent.KERNEL32(?), ref: 00404EBA
                                                                                        • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                                        • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                                        • SetEvent.KERNEL32(?), ref: 00404ED1
                                                                                        • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 2403171778-263838557
                                                                                        • Opcode ID: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                                                                        • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                                        • Opcode Fuzzy Hash: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                                                                        • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 465 448299-4482b0 GetLastError 466 4482b2-4482bc call 4487bc 465->466 467 4482be-4482c5 call 445af3 465->467 466->467 474 44830f-448316 SetLastError 466->474 470 4482ca-4482d0 467->470 472 4482d2 470->472 473 4482db-4482e9 call 448812 470->473 476 4482d3-4482d9 call 446782 472->476 481 4482ee-448304 call 448087 call 446782 473->481 482 4482eb-4482ec 473->482 475 448318-44831d 474->475 483 448306-44830d SetLastError 476->483 481->474 481->483 482->476 483->475
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044829E
                                                                                        • _free.LIBCMT ref: 004482D3
                                                                                        • _free.LIBCMT ref: 004482FA
                                                                                        • SetLastError.KERNEL32(00000000), ref: 00448307
                                                                                        • SetLastError.KERNEL32(00000000), ref: 00448310
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free
                                                                                        • String ID:
                                                                                        • API String ID: 3170660625-0
                                                                                        • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                                        • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                                        • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                                        • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 496 448566-44857a 497 448587-4485a2 LoadLibraryExW 496->497 498 44857c-448585 496->498 499 4485a4-4485ad GetLastError 497->499 500 4485cb-4485d1 497->500 501 4485de-4485e0 498->501 502 4485bc 499->502 503 4485af-4485ba LoadLibraryExW 499->503 504 4485d3-4485d4 FreeLibrary 500->504 505 4485da 500->505 506 4485be-4485c0 502->506 503->506 504->505 507 4485dc-4485dd 505->507 506->500 508 4485c2-4485c9 506->508 507->501 508->507
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                                        • GetLastError.KERNEL32(?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 3177248105-0
                                                                                        • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                                        • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                                        • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                                        • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 509 40d069-40d095 call 401fab CreateMutexA GetLastError
                                                                                        APIs
                                                                                        • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                                        • GetLastError.KERNEL32 ref: 0040D083
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastMutex
                                                                                        • String ID: SG
                                                                                        • API String ID: 1925916568-3189917014
                                                                                        • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                                        • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                                        • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                                        • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 512 4484ca-4484f4 513 4484f6-4484f8 512->513 514 44855f 512->514 515 4484fe-448504 513->515 516 4484fa-4484fc 513->516 517 448561-448565 514->517 518 448506-448508 call 448566 515->518 519 448520 515->519 516->517 522 44850d-448510 518->522 521 448522-448524 519->521 523 448526-448534 GetProcAddress 521->523 524 44854f-44855d 521->524 525 448541-448547 522->525 526 448512-448518 522->526 527 448536-44853f call 43436e 523->527 528 448549 523->528 524->514 525->521 526->518 529 44851a 526->529 527->516 528->524 529->519
                                                                                        APIs
                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 0044852A
                                                                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressProc__crt_fast_encode_pointer
                                                                                        • String ID:
                                                                                        • API String ID: 2279764990-0
                                                                                        • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                                        • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                                                                        • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                                        • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 532 40165e-401664 533 401666-401668 532->533 534 401669-401674 532->534 535 401676 534->535 536 40167b-401685 534->536 535->536 537 401687-40168d 536->537 538 4016a8-4016a9 call 4344ea 536->538 537->538 540 40168f-401694 537->540 541 4016ae-4016af 538->541 540->535 542 401696-4016a6 call 4344ea 540->542 543 4016b1-4016b3 541->543 542->543
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                                                        • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                                        • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                                                        • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 560 445af3-445afe 561 445b00-445b0a 560->561 562 445b0c-445b12 560->562 561->562 563 445b40-445b4b call 4405dd 561->563 564 445b14-445b15 562->564 565 445b2b-445b3c RtlAllocateHeap 562->565 569 445b4d-445b4f 563->569 564->565 566 445b17-445b1e call 445545 565->566 567 445b3e 565->567 566->563 573 445b20-445b29 call 442f80 566->573 567->569 573->563 573->565
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000), ref: 00445B34
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                                                                        • Instruction ID: e1e4bc9e3ed5bc60ab2f969cc6486aa84e060793a1580145f61584a75d3ee698
                                                                                        • Opcode Fuzzy Hash: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                                                                        • Instruction Fuzzy Hash: 9DF09031600D6967BF316A229C06B5BB749EB42760B548027BD08AA297CA38F80186BC
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 576 446137-446143 577 446175-446180 call 4405dd 576->577 578 446145-446147 576->578 585 446182-446184 577->585 580 446160-446171 RtlAllocateHeap 578->580 581 446149-44614a 578->581 582 446173 580->582 583 44614c-446153 call 445545 580->583 581->580 582->585 583->577 588 446155-44615e call 442f80 583->588 588->577 588->580
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                                        • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                                        • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                                        • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                                        • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                                          • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                                                                          • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                                                                          • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                                                                          • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                                                                          • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                                        • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                                                                        • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                                        • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                                          • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                                          • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                                          • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                                          • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                                        • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                                        • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                                                                          • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                        • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                        • API String ID: 1067849700-181434739
                                                                                        • Opcode ID: ee20889b26462be3d37d60383eaca84b38c4e413c047457fbe9ae68671e6accb
                                                                                        • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                                        • Opcode Fuzzy Hash: ee20889b26462be3d37d60383eaca84b38c4e413c047457fbe9ae68671e6accb
                                                                                        • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                        • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                                        • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                        • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                        • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                                        • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                          • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                        • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                                                                        • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                        • CloseHandle.KERNEL32 ref: 00405A23
                                                                                        • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                        • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                        • CloseHandle.KERNEL32 ref: 00405A45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                        • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                        • API String ID: 2994406822-18413064
                                                                                        • Opcode ID: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                                                                                        • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                                        • Opcode Fuzzy Hash: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                                                                                        • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                                          • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                          • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                                          • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                                        • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                                        • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                        • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                        • API String ID: 3018269243-13974260
                                                                                        • Opcode ID: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                                                                        • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                                        • Opcode Fuzzy Hash: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                                                                        • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFile$FirstNext
                                                                                        • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                        • API String ID: 1164774033-3681987949
                                                                                        • Opcode ID: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                                                                        • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                                        • Opcode Fuzzy Hash: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                                                                        • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenClipboard.USER32 ref: 004168C2
                                                                                        • EmptyClipboard.USER32 ref: 004168D0
                                                                                        • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                                        • CloseClipboard.USER32 ref: 00416955
                                                                                        • OpenClipboard.USER32 ref: 0041695C
                                                                                        • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                                        • CloseClipboard.USER32 ref: 00416984
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                        • String ID: !D@
                                                                                        • API String ID: 3520204547-604454484
                                                                                        • Opcode ID: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                                        • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                                        • Opcode Fuzzy Hash: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                                        • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Find$Close$File$FirstNext
                                                                                        • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                        • API String ID: 3527384056-432212279
                                                                                        • Opcode ID: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                                                                                        • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                                        • Opcode Fuzzy Hash: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                                                                                        • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                                                                          • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                          • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                        • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                        • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                        • API String ID: 3756808967-1743721670
                                                                                        • Opcode ID: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                                                                        • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                                        • Opcode Fuzzy Hash: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                                                                        • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                        • API String ID: 0-1861860590
                                                                                        • Opcode ID: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                                                                        • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                                        • Opcode Fuzzy Hash: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                                                                        • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 00407521
                                                                                        • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Object_wcslen
                                                                                        • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                        • API String ID: 240030777-3166923314
                                                                                        • Opcode ID: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                                                                        • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                                        • Opcode Fuzzy Hash: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                                                                        • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                                        • GetLastError.KERNEL32 ref: 0041A7BB
                                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                        • String ID:
                                                                                        • API String ID: 3587775597-0
                                                                                        • Opcode ID: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                                                                                        • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                                        • Opcode Fuzzy Hash: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                                                                                        • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                        • String ID: lJD$lJD$lJD
                                                                                        • API String ID: 745075371-479184356
                                                                                        • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                                        • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                                        • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                                        • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                                        • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFile$FirstNext
                                                                                        • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                        • API String ID: 1164774033-405221262
                                                                                        • Opcode ID: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                                                                        • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                                        • Opcode Fuzzy Hash: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                                                                        • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C38E
                                                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C39B
                                                                                          • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C3BC
                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                                                                        • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3E2
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                        • String ID:
                                                                                        • API String ID: 2341273852-0
                                                                                        • Opcode ID: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                                                                        • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                                        • Opcode Fuzzy Hash: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                                                                        • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                                                        • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                                                          • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$Find$CreateFirstNext
                                                                                        • String ID: 8SG$PXG$PXG$NG$PG
                                                                                        • API String ID: 341183262-3812160132
                                                                                        • Opcode ID: 82314eeff241e38e25ba769843facc622900e81eecec2918aec2115619fdd9a6
                                                                                        • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                                                        • Opcode Fuzzy Hash: 82314eeff241e38e25ba769843facc622900e81eecec2918aec2115619fdd9a6
                                                                                        • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                                        • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                                        • GetLastError.KERNEL32 ref: 0040A2ED
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                                                                        • TranslateMessage.USER32(?), ref: 0040A34A
                                                                                        • DispatchMessageA.USER32(?), ref: 0040A355
                                                                                        Strings
                                                                                        • Keylogger initialization failure: error , xrefs: 0040A301
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                        • String ID: Keylogger initialization failure: error
                                                                                        • API String ID: 3219506041-952744263
                                                                                        • Opcode ID: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                                                                        • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                                        • Opcode Fuzzy Hash: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                                                                        • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetForegroundWindow.USER32 ref: 0040A416
                                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                                        • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                                        • GetKeyState.USER32(00000010), ref: 0040A433
                                                                                        • GetKeyboardState.USER32(?), ref: 0040A43E
                                                                                        • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                                        • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                                        • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                        • String ID:
                                                                                        • API String ID: 1888522110-0
                                                                                        • Opcode ID: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                                                                        • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                                        • Opcode Fuzzy Hash: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                                                                        • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                        • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                        • API String ID: 2127411465-314212984
                                                                                        • Opcode ID: 503daa7f3cf37e559493f2b38fbdbd662be014167a3854e37f89a3b2555f4814
                                                                                        • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                                        • Opcode Fuzzy Hash: 503daa7f3cf37e559493f2b38fbdbd662be014167a3854e37f89a3b2555f4814
                                                                                        • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 00449212
                                                                                        • _free.LIBCMT ref: 00449236
                                                                                        • _free.LIBCMT ref: 004493BD
                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                                        • _free.LIBCMT ref: 00449589
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                        • String ID:
                                                                                        • API String ID: 314583886-0
                                                                                        • Opcode ID: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                                                                                        • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                                        • Opcode Fuzzy Hash: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                                                                                        • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                                          • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                                          • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                                          • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                                          • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                                        • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                                        • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                        • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                        • API String ID: 1589313981-2876530381
                                                                                        • Opcode ID: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                                                                        • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                                        • Opcode Fuzzy Hash: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                                                                        • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                                        • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID: ACP$OCP$['E
                                                                                        • API String ID: 2299586839-2532616801
                                                                                        • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                                        • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                                        • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                                        • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                                        • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                                        • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                                        Strings
                                                                                        • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Internet$CloseHandleOpen$FileRead
                                                                                        • String ID: http://geoplugin.net/json.gp
                                                                                        • API String ID: 3121278467-91888290
                                                                                        • Opcode ID: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                                                                                        • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                                        • Opcode Fuzzy Hash: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                                                                                        • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                                        • GetLastError.KERNEL32 ref: 0040BA58
                                                                                        Strings
                                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                                        • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                                        • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                                        • UserProfile, xrefs: 0040BA1E
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DeleteErrorFileLast
                                                                                        • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                        • API String ID: 2018770650-1062637481
                                                                                        • Opcode ID: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                                                                                        • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                                        • Opcode Fuzzy Hash: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                                                                                        • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                                        • GetLastError.KERNEL32 ref: 0041799D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                        • String ID: SeShutdownPrivilege
                                                                                        • API String ID: 3534403312-3733053543
                                                                                        • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                                        • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                                        • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                                        • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00409258
                                                                                          • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                                        • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                                          • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                                                          • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                                                                          • Part of subcall function 00404E26: FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                                                                        • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                                                                                        • String ID:
                                                                                        • API String ID: 2435342581-0
                                                                                        • Opcode ID: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                                                                        • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                                        • Opcode Fuzzy Hash: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                                                                        • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                                        • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                        • String ID:
                                                                                        • API String ID: 276877138-0
                                                                                        • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                                        • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                                        • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                                        • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                                                        • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                                                                        • _wcschr.LIBVCRUNTIME ref: 00451E58
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                        • String ID: sJD
                                                                                        • API String ID: 4212172061-3536923933
                                                                                        • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                                        • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                                        • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                                        • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00413549: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 00413569
                                                                                          • Part of subcall function 00413549: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 00413587
                                                                                          • Part of subcall function 00413549: RegCloseKey.ADVAPI32(00000000), ref: 00413592
                                                                                        • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                                        • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                        • String ID: 4.9.4 Pro$override$pth_unenc
                                                                                        • API String ID: 2281282204-930821335
                                                                                        • Opcode ID: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                                        • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                                        • Opcode Fuzzy Hash: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                                        • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                                                                        • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                                        • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                                        • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                        • String ID: SETTINGS
                                                                                        • API String ID: 3473537107-594951305
                                                                                        • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                                        • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                                        • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                                        • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 0040966A
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                                        • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseFirstH_prologNext
                                                                                        • String ID:
                                                                                        • API String ID: 1157919129-0
                                                                                        • Opcode ID: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                                                                        • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                                        • Opcode Fuzzy Hash: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                                                                        • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00408811
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                        • String ID:
                                                                                        • API String ID: 1771804793-0
                                                                                        • Opcode ID: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                                        • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                                        • Opcode Fuzzy Hash: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                                        • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DownloadExecuteFileShell
                                                                                        • String ID: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe$open
                                                                                        • API String ID: 2825088817-225355153
                                                                                        • Opcode ID: 8341db3bc302fba65028eb5830d70bd40add62ae0f2dccab7f4c30313c030271
                                                                                        • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                                        • Opcode Fuzzy Hash: 8341db3bc302fba65028eb5830d70bd40add62ae0f2dccab7f4c30313c030271
                                                                                        • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileFind$FirstNextsend
                                                                                        • String ID: XPG$XPG
                                                                                        • API String ID: 4113138495-1962359302
                                                                                        • Opcode ID: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                                        • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                                        • Opcode Fuzzy Hash: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                                        • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                                          • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                                                                          • Part of subcall function 0041376F: RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                                                                          • Part of subcall function 0041376F: RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCreateInfoParametersSystemValue
                                                                                        • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                        • API String ID: 4127273184-3576401099
                                                                                        • Opcode ID: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                                        • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                                        • Opcode Fuzzy Hash: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                                        • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 0-263838557
                                                                                        • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                                        • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                                                                        • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                                        • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                        • String ID:
                                                                                        • API String ID: 2829624132-0
                                                                                        • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                                        • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                                        • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                                        • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,004334BF,00000034,?,?,00000000), ref: 00433849
                                                                                        • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?), ref: 0043385F
                                                                                        • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?,0041E251), ref: 00433871
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Crypt$Context$AcquireRandomRelease
                                                                                        • String ID:
                                                                                        • API String ID: 1815803762-0
                                                                                        • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                        • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                                        • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                        • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenClipboard.USER32(00000000), ref: 0040B711
                                                                                        • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                                                                        • CloseClipboard.USER32 ref: 0040B725
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Clipboard$CloseDataOpen
                                                                                        • String ID:
                                                                                        • API String ID: 2058664381-0
                                                                                        • Opcode ID: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                                                                        • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                                        • Opcode Fuzzy Hash: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                                                                        • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                        • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                        • String ID: lJD
                                                                                        • API String ID: 1084509184-3316369744
                                                                                        • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                                        • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                                                        • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                                        • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                        • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                        • String ID: lJD
                                                                                        • API String ID: 1084509184-3316369744
                                                                                        • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                                        • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                                        • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                                        • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID: GetLocaleInfoEx
                                                                                        • API String ID: 2299586839-2904428671
                                                                                        • Opcode ID: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                                                                        • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                                        • Opcode Fuzzy Hash: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                                                                        • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                        • String ID:
                                                                                        • API String ID: 1663032902-0
                                                                                        • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                                        • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                                        • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                                        • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$InfoLocale_abort_free
                                                                                        • String ID:
                                                                                        • API String ID: 2692324296-0
                                                                                        • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                        • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                                        • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                        • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: NameUser
                                                                                        • String ID:
                                                                                        • API String ID: 2645101109-0
                                                                                        • Opcode ID: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                                                                        • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                                        • Opcode Fuzzy Hash: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                                                                        • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(?,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                                        • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1272433827-0
                                                                                        • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                                        • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                                        • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                                        • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                        • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                        • String ID:
                                                                                        • API String ID: 1084509184-0
                                                                                        • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                                        • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                                                        • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                                        • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,4.9.4 Pro), ref: 0040F8E5
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                                                        • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                        • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                                                        • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                                          • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                                        • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                                        • GetIconInfo.USER32(?,?), ref: 00418FBD
                                                                                        • DeleteObject.GDI32(?), ref: 00418FEC
                                                                                        • DeleteObject.GDI32(?), ref: 00418FF9
                                                                                        • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                                        • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                                        • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                                        • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                                        • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                                        • DeleteDC.GDI32(?), ref: 0041917C
                                                                                        • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                                        • DeleteObject.GDI32(00000000), ref: 00419182
                                                                                        • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                                        • DeleteObject.GDI32(00000000), ref: 00419241
                                                                                        • GlobalFree.KERNEL32(?), ref: 00419248
                                                                                        • DeleteDC.GDI32(?), ref: 00419258
                                                                                        • DeleteDC.GDI32(00000000), ref: 00419263
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                                        • String ID: DISPLAY
                                                                                        • API String ID: 479521175-865373369
                                                                                        • Opcode ID: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                                                                                        • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                                        • Opcode Fuzzy Hash: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                                                                                        • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                                        • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                                        • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                                        • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                                        • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                                                        • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                                        • ResumeThread.KERNEL32(?), ref: 00418435
                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                                        • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                                        • GetLastError.KERNEL32 ref: 0041847A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                        • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                        • API String ID: 4188446516-3035715614
                                                                                        • Opcode ID: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                                                                        • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                                        • Opcode Fuzzy Hash: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                                                                        • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                                          • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                                          • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                                                                          • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                                          • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                                                                          • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                                        • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                        • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                        • API String ID: 1861856835-332907002
                                                                                        • Opcode ID: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                                                                        • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                                        • Opcode Fuzzy Hash: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                                                                        • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                                          • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                                          • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                                                                          • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                                          • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                                                                          • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                                        • ExitProcess.KERNEL32 ref: 0040D419
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                        • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                                        • API String ID: 3797177996-2557013105
                                                                                        • Opcode ID: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                                                                        • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                                        • Opcode Fuzzy Hash: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                                                                        • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                                        • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                                        • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                                        • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                                        • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                                          • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                                        • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                        • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                        • API String ID: 2649220323-436679193
                                                                                        • Opcode ID: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                                                                        • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                                        • Opcode Fuzzy Hash: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                                                                        • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                                        • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                                        • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                                                                        • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                                        • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                                        • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                                        • SetEvent.KERNEL32 ref: 0041B219
                                                                                        • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                                        • CloseHandle.KERNEL32 ref: 0041B23A
                                                                                        • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                                        • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                        • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                        • API String ID: 738084811-2094122233
                                                                                        • Opcode ID: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                                                                        • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                                        • Opcode Fuzzy Hash: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                                                                        • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                        • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                        • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                        • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                        • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                        • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                        • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                        • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                        • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$Write$Create
                                                                                        • String ID: RIFF$WAVE$data$fmt
                                                                                        • API String ID: 1602526932-4212202414
                                                                                        • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                                        • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                                        • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                                        • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe,00000001,0040764D,C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                        • API String ID: 1646373207-882057332
                                                                                        • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                                        • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                                        • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                                        • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 0040CE07
                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                                        • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                                                                        • _wcslen.LIBCMT ref: 0040CEE6
                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                                        • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe,00000000,00000000), ref: 0040CF84
                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                                        • _wcslen.LIBCMT ref: 0040CFC6
                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                                        • ExitProcess.KERNEL32 ref: 0040D062
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                        • String ID: 6$C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe$del$open
                                                                                        • API String ID: 1579085052-2689153522
                                                                                        • Opcode ID: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                                                                                        • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                                        • Opcode Fuzzy Hash: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                                                                                        • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                                        • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                                        • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                                        • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                                        • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                                        • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                                        • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                                        • _wcslen.LIBCMT ref: 0041C13B
                                                                                        • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                                        • GetLastError.KERNEL32 ref: 0041C173
                                                                                        • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                                        • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                                        • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                                        • GetLastError.KERNEL32 ref: 0041C1D0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                        • String ID: ?
                                                                                        • API String ID: 3941738427-1684325040
                                                                                        • Opcode ID: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                                                                        • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                                        • Opcode Fuzzy Hash: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                                                                        • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                        • String ID: IA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                        • API String ID: 2490988753-1941338355
                                                                                        • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                                        • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                                        • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                                        • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$EnvironmentVariable$_wcschr
                                                                                        • String ID:
                                                                                        • API String ID: 3899193279-0
                                                                                        • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                                        • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                                        • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                                        • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                                          • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                                          • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                                          • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                                        • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                                        • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                                        • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                                        • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                                        • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                                        • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                                        • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                                        • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                        • String ID: /stext "$0TG$0TG$NG$NG
                                                                                        • API String ID: 1223786279-2576077980
                                                                                        • Opcode ID: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                                                                        • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                                        • Opcode Fuzzy Hash: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                                                                        • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                                        • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEnumOpen
                                                                                        • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                        • API String ID: 1332880857-3714951968
                                                                                        • Opcode ID: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                                                                                        • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                                        • Opcode Fuzzy Hash: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                                                                                        • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                                        • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                                        • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                                        • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                                        • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                                        • ExitProcess.KERNEL32 ref: 0041D665
                                                                                        • CreatePopupMenu.USER32 ref: 0041D66B
                                                                                        • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                        • String ID: Close
                                                                                        • API String ID: 1657328048-3535843008
                                                                                        • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                                        • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                                        • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                                        • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$Info
                                                                                        • String ID:
                                                                                        • API String ID: 2509303402-0
                                                                                        • Opcode ID: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                                                                                        • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                                        • Opcode Fuzzy Hash: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                                                                                        • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                                                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                                        • __aulldiv.LIBCMT ref: 00408D4D
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                                        • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                                        • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                        • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                        • API String ID: 3086580692-2582957567
                                                                                        • Opcode ID: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                                                                                        • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                                        • Opcode Fuzzy Hash: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                                                                                        • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                                          • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                                          • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                                          • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                                          • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                                        • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                                        • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                                                                          • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,00000000,00000000,00000000), ref: 0040A927
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                        • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                        • API String ID: 3795512280-1152054767
                                                                                        • Opcode ID: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                                                                                        • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                                        • Opcode Fuzzy Hash: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                                                                                        • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • connect.WS2_32(?,?,?), ref: 004048E0
                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                        • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                        • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                        • API String ID: 994465650-3229884001
                                                                                        • Opcode ID: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                                        • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                                        • Opcode Fuzzy Hash: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                                        • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                                          • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                                        • _free.LIBCMT ref: 004512FF
                                                                                          • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                          • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                        • _free.LIBCMT ref: 00451321
                                                                                        • _free.LIBCMT ref: 00451336
                                                                                        • _free.LIBCMT ref: 00451341
                                                                                        • _free.LIBCMT ref: 00451363
                                                                                        • _free.LIBCMT ref: 00451376
                                                                                        • _free.LIBCMT ref: 00451384
                                                                                        • _free.LIBCMT ref: 0045138F
                                                                                        • _free.LIBCMT ref: 004513C7
                                                                                        • _free.LIBCMT ref: 004513CE
                                                                                        • _free.LIBCMT ref: 004513EB
                                                                                        • _free.LIBCMT ref: 00451403
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                        • String ID:
                                                                                        • API String ID: 161543041-0
                                                                                        • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                        • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                                        • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                        • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __EH_prolog.LIBCMT ref: 00419FB9
                                                                                        • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                                        • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                                        • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                                        • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                        • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                                        • API String ID: 489098229-1431523004
                                                                                        • Opcode ID: 794bb2b208bad590467bd00f6a6004f6f957c756b4e279e9b706f936551238fb
                                                                                        • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                                        • Opcode Fuzzy Hash: 794bb2b208bad590467bd00f6a6004f6f957c756b4e279e9b706f936551238fb
                                                                                        • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                                          • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                                          • Part of subcall function 004136F8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00413714
                                                                                          • Part of subcall function 004136F8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 0041372D
                                                                                          • Part of subcall function 004136F8: RegCloseKey.ADVAPI32(?), ref: 00413738
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                                        • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                        • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                        • API String ID: 1913171305-3159800282
                                                                                        • Opcode ID: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                                                                        • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                                        • Opcode Fuzzy Hash: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                                                                        • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free
                                                                                        • String ID:
                                                                                        • API String ID: 269201875-0
                                                                                        • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                                        • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                                        • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                                        • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                                                                        • GetLastError.KERNEL32 ref: 00455CEF
                                                                                        • __dosmaperr.LIBCMT ref: 00455CF6
                                                                                        • GetFileType.KERNEL32(00000000), ref: 00455D02
                                                                                        • GetLastError.KERNEL32 ref: 00455D0C
                                                                                        • __dosmaperr.LIBCMT ref: 00455D15
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                                        • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                                        • GetLastError.KERNEL32 ref: 00455EB1
                                                                                        • __dosmaperr.LIBCMT ref: 00455EB8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                        • String ID: H
                                                                                        • API String ID: 4237864984-2852464175
                                                                                        • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                                        • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                                        • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                                        • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                                                        • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                                                        • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                                                          • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                                                        • __freea.LIBCMT ref: 00454003
                                                                                        • __freea.LIBCMT ref: 0045400F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                        • String ID: \@E
                                                                                        • API String ID: 201697637-1814623452
                                                                                        • Opcode ID: 347d6d77569ccb8731e03be0652f4f39992ef0e8e93efb01081f6886d5a4a2b8
                                                                                        • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                                        • Opcode Fuzzy Hash: 347d6d77569ccb8731e03be0652f4f39992ef0e8e93efb01081f6886d5a4a2b8
                                                                                        • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,$C,0043EA24,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006), ref: 0044ACA3
                                                                                        • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006,?,?,?), ref: 0044AD29
                                                                                        • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,73E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                                        • __freea.LIBCMT ref: 0044AE30
                                                                                          • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                        • __freea.LIBCMT ref: 0044AE39
                                                                                        • __freea.LIBCMT ref: 0044AE5E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                        • String ID: $C$PkGNG
                                                                                        • API String ID: 3864826663-3740547665
                                                                                        • Opcode ID: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                                                                                        • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                                        • Opcode Fuzzy Hash: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                                                                                        • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free
                                                                                        • String ID: \&G$\&G$`&G
                                                                                        • API String ID: 269201875-253610517
                                                                                        • Opcode ID: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                                                                                        • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                                        • Opcode Fuzzy Hash: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                                                                                        • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 65535$udp
                                                                                        • API String ID: 0-1267037602
                                                                                        • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                                        • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                                        • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                                        • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                                                        • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                                                        • GetForegroundWindow.USER32 ref: 0040AD49
                                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                                                                        • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                                                                        • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                                                          • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                        • String ID: [${ User has been idle for $ minutes }$]
                                                                                        • API String ID: 911427763-3954389425
                                                                                        • Opcode ID: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                                                                                        • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                                                        • Opcode Fuzzy Hash: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                                                                                        • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LongNamePath
                                                                                        • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                        • API String ID: 82841172-425784914
                                                                                        • Opcode ID: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                                                                                        • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                                        • Opcode Fuzzy Hash: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                                                                                        • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                                        • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                                        • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                                        • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                                        • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                                        • __dosmaperr.LIBCMT ref: 0043A937
                                                                                        • _free.LIBCMT ref: 0043A943
                                                                                        • _free.LIBCMT ref: 0043A94A
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                        • String ID:
                                                                                        • API String ID: 2441525078-0
                                                                                        • Opcode ID: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                                                                        • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                                        • Opcode Fuzzy Hash: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                                                                        • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                                        • TranslateMessage.USER32(?), ref: 0040557E
                                                                                        • DispatchMessageA.USER32(?), ref: 00405589
                                                                                        • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                        • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                        • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                        • API String ID: 2956720200-749203953
                                                                                        • Opcode ID: fef61f91b449ae31e274f9846cb3759d0d19ea8c240772b62dae1734d23b140a
                                                                                        • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                                        • Opcode Fuzzy Hash: fef61f91b449ae31e274f9846cb3759d0d19ea8c240772b62dae1734d23b140a
                                                                                        • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                                        • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                                        • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                        • String ID: 0VG$0VG$<$@$Temp
                                                                                        • API String ID: 1704390241-2575729100
                                                                                        • Opcode ID: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                                                                                        • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                                        • Opcode Fuzzy Hash: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                                                                                        • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenClipboard.USER32 ref: 00416941
                                                                                        • EmptyClipboard.USER32 ref: 0041694F
                                                                                        • CloseClipboard.USER32 ref: 00416955
                                                                                        • OpenClipboard.USER32 ref: 0041695C
                                                                                        • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                                        • CloseClipboard.USER32 ref: 00416984
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                        • String ID: !D@
                                                                                        • API String ID: 2172192267-604454484
                                                                                        • Opcode ID: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                                        • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                                        • Opcode Fuzzy Hash: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                                        • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                                        • CloseHandle.KERNEL32(?), ref: 00413465
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                        • String ID:
                                                                                        • API String ID: 297527592-0
                                                                                        • Opcode ID: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                                                                                        • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                                        • Opcode Fuzzy Hash: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                                                                                        • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                        • String ID:
                                                                                        • API String ID: 221034970-0
                                                                                        • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                                                        • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                                        • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                                                        • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 00448135
                                                                                          • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                          • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                        • _free.LIBCMT ref: 00448141
                                                                                        • _free.LIBCMT ref: 0044814C
                                                                                        • _free.LIBCMT ref: 00448157
                                                                                        • _free.LIBCMT ref: 00448162
                                                                                        • _free.LIBCMT ref: 0044816D
                                                                                        • _free.LIBCMT ref: 00448178
                                                                                        • _free.LIBCMT ref: 00448183
                                                                                        • _free.LIBCMT ref: 0044818E
                                                                                        • _free.LIBCMT ref: 0044819C
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                                        • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                                        • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                                        • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Eventinet_ntoa
                                                                                        • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                        • API String ID: 3578746661-3604713145
                                                                                        • Opcode ID: a7bd2cf574d9c29f0f452118638ed50856907e78b238ba203f6b8faaf9cf41f8
                                                                                        • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                                        • Opcode Fuzzy Hash: a7bd2cf574d9c29f0f452118638ed50856907e78b238ba203f6b8faaf9cf41f8
                                                                                        • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DecodePointer
                                                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                        • API String ID: 3527080286-3064271455
                                                                                        • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                                        • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                                                                        • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                                        • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                                                                        • __fassign.LIBCMT ref: 0044B479
                                                                                        • __fassign.LIBCMT ref: 0044B494
                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                                        • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B4D9
                                                                                        • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B512
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 1324828854-263838557
                                                                                        • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                                        • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                                        • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                                        • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                                          • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                        • Sleep.KERNEL32(00000064), ref: 00417521
                                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CreateDeleteExecuteShellSleep
                                                                                        • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                        • API String ID: 1462127192-2001430897
                                                                                        • Opcode ID: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                                                                        • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                                        • Opcode Fuzzy Hash: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                                                                        • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe), ref: 0040749E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentProcess
                                                                                        • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                        • API String ID: 2050909247-4242073005
                                                                                        • Opcode ID: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                                                                        • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                                        • Opcode Fuzzy Hash: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                                                                        • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _strftime.LIBCMT ref: 00401D50
                                                                                          • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                        • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                        • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                        • API String ID: 3809562944-243156785
                                                                                        • Opcode ID: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                                                                                        • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                                        • Opcode Fuzzy Hash: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                                                                                        • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                                        • int.LIBCPMT ref: 00410E81
                                                                                          • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                                          • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                                        • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                                        • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                        • String ID: ,kG$0kG
                                                                                        • API String ID: 3815856325-2015055088
                                                                                        • Opcode ID: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                                                                                        • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                                        • Opcode Fuzzy Hash: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                                                                                        • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                        • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                        • waveInStart.WINMM ref: 00401CFE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                        • String ID: dMG$|MG$PG
                                                                                        • API String ID: 1356121797-532278878
                                                                                        • Opcode ID: f0413ad6b7edbe83be065844dac3f0d77922414ea45c2d30098e63d2db50c4df
                                                                                        • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                                        • Opcode Fuzzy Hash: f0413ad6b7edbe83be065844dac3f0d77922414ea45c2d30098e63d2db50c4df
                                                                                        • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                                          • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                                          • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                                          • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                                        • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                                        • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                                        • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                                        • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                                        • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                        • String ID: Remcos
                                                                                        • API String ID: 1970332568-165870891
                                                                                        • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                                        • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                                        • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                                        • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                                                                                        • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                                        • Opcode Fuzzy Hash: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                                                                                        • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                          • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                                          • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                          • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                                        • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                                        • _free.LIBCMT ref: 00445494
                                                                                        • _free.LIBCMT ref: 004454AD
                                                                                        • _free.LIBCMT ref: 004454DF
                                                                                        • _free.LIBCMT ref: 004454E8
                                                                                        • _free.LIBCMT ref: 004454F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorLast$_abort_memcmp
                                                                                        • String ID: C
                                                                                        • API String ID: 1679612858-1037565863
                                                                                        • Opcode ID: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                                                                                        • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                                        • Opcode Fuzzy Hash: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                                                                                        • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: tcp$udp
                                                                                        • API String ID: 0-3725065008
                                                                                        • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                                        • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                                        • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                                        • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                                        • SetLastError.KERNEL32(000000C1,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                                        • GetNativeSystemInfo.KERNEL32(?,?,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                                                                        • SetLastError.KERNEL32(0000000E), ref: 00411DC9
                                                                                          • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,00411DE7,?,00000000,00003000,00000040,00000000), ref: 00411CB3
                                                                                        • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00411E10
                                                                                        • HeapAlloc.KERNEL32(00000000), ref: 00411E17
                                                                                        • SetLastError.KERNEL32(0000045A), ref: 00411F2A
                                                                                          • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                                                                                          • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                        • String ID: t^F
                                                                                        • API String ID: 3950776272-389975521
                                                                                        • Opcode ID: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                                                                                        • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                                        • Opcode Fuzzy Hash: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                                                                                        • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                        • ExitThread.KERNEL32 ref: 004018F6
                                                                                        • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                                          • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                        • String ID: PkG$XMG$NG$NG
                                                                                        • API String ID: 1649129571-3151166067
                                                                                        • Opcode ID: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                                                                        • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                                        • Opcode Fuzzy Hash: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                                                                        • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                                                                        • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                                                                        • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                                                                        • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                                                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                                          • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                                                          • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                        • String ID: .part
                                                                                        • API String ID: 1303771098-3499674018
                                                                                        • Opcode ID: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                                        • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                                        • Opcode Fuzzy Hash: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                                        • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                                                                        • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InputSend
                                                                                        • String ID:
                                                                                        • API String ID: 3431551938-0
                                                                                        • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                                        • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                                        • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                                        • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __freea$__alloca_probe_16_free
                                                                                        • String ID: a/p$am/pm$zD
                                                                                        • API String ID: 2936374016-2723203690
                                                                                        • Opcode ID: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                                                                        • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                                        • Opcode Fuzzy Hash: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                                                                        • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Enum$InfoQueryValue
                                                                                        • String ID: [regsplt]$xUG$TG
                                                                                        • API String ID: 3554306468-1165877943
                                                                                        • Opcode ID: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                                        • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                                        • Opcode Fuzzy Hash: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                                        • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free
                                                                                        • String ID: D[E$D[E
                                                                                        • API String ID: 269201875-3695742444
                                                                                        • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                                        • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                                        • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                                        • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                                                                          • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                                          • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEnumInfoOpenQuerysend
                                                                                        • String ID: xUG$NG$NG$TG
                                                                                        • API String ID: 3114080316-2811732169
                                                                                        • Opcode ID: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                                                                                        • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                                        • Opcode Fuzzy Hash: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                                                                                        • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F8C8,?,00000000,?,00000001,?,000000FF,00000001,0043F8C8,?), ref: 00451179
                                                                                        • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451202
                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451214
                                                                                        • __freea.LIBCMT ref: 0045121D
                                                                                          • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 313313983-263838557
                                                                                        • Opcode ID: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                                                                        • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                                        • Opcode Fuzzy Hash: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                                                                        • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                                                                          • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                                          • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                                          • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                        • _wcslen.LIBCMT ref: 0041B763
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                        • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                        • API String ID: 37874593-122982132
                                                                                        • Opcode ID: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                                                                        • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                                        • Opcode Fuzzy Hash: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                                                                        • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                                          • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                                          • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                                                                        • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                                        • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                        • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                        • API String ID: 1133728706-4073444585
                                                                                        • Opcode ID: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                                                                                        • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                                        • Opcode Fuzzy Hash: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                                                                                        • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                                                                                        • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                                        • Opcode Fuzzy Hash: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                                                                                        • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                                        • _free.LIBCMT ref: 00450F48
                                                                                          • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                          • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                        • _free.LIBCMT ref: 00450F53
                                                                                        • _free.LIBCMT ref: 00450F5E
                                                                                        • _free.LIBCMT ref: 00450FB2
                                                                                        • _free.LIBCMT ref: 00450FBD
                                                                                        • _free.LIBCMT ref: 00450FC8
                                                                                        • _free.LIBCMT ref: 00450FD3
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                        • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                                        • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                        • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                                        • int.LIBCPMT ref: 00411183
                                                                                          • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                                          • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                                        • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                        • String ID: (mG
                                                                                        • API String ID: 2536120697-4059303827
                                                                                        • Opcode ID: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                                                                        • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                                        • Opcode Fuzzy Hash: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                                                                        • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                          • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                                          • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                                          • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                                                                        • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCurrentOpenProcessQueryValue
                                                                                        • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                        • API String ID: 1866151309-2070987746
                                                                                        • Opcode ID: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                                                                        • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                                        • Opcode Fuzzy Hash: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                                                                        • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                                        • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                        • String ID:
                                                                                        • API String ID: 3852720340-0
                                                                                        • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                                        • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                                        • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                                        • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe), ref: 004075D0
                                                                                          • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                                          • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                                        • CoUninitialize.OLE32 ref: 00407629
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InitializeObjectUninitialize_wcslen
                                                                                        • String ID: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                        • API String ID: 3851391207-212451407
                                                                                        • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                                        • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                                        • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                                        • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                                        • GetLastError.KERNEL32 ref: 0040BAE7
                                                                                        Strings
                                                                                        • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                                        • [Chrome Cookies not found], xrefs: 0040BB01
                                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                                        • UserProfile, xrefs: 0040BAAD
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DeleteErrorFileLast
                                                                                        • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                        • API String ID: 2018770650-304995407
                                                                                        • Opcode ID: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                                                                                        • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                                        • Opcode Fuzzy Hash: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                                                                                        • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                                        • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Console$AllocOutputShowWindow
                                                                                        • String ID: Remcos v$4.9.4 Pro$CONOUT$
                                                                                        • API String ID: 2425139147-3065609815
                                                                                        • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                                        • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                                        • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                                        • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002), ref: 0044335A
                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG), ref: 00443390
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$PkGNG$mscoree.dll
                                                                                        • API String ID: 4061214504-213444651
                                                                                        • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                                        • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                                        • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                                        • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __allrem.LIBCMT ref: 0043AC69
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                                        • __allrem.LIBCMT ref: 0043AC9C
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                                        • __allrem.LIBCMT ref: 0043ACD1
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                        • String ID:
                                                                                        • API String ID: 1992179935-0
                                                                                        • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                                        • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                                        • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                                        • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                                                                          • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: H_prologSleep
                                                                                        • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                        • API String ID: 3469354165-3054508432
                                                                                        • Opcode ID: 08fcd3a8c76131e8007374677ce5b6c0692de0a008e8c0ef5a68710063425739
                                                                                        • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                                        • Opcode Fuzzy Hash: 08fcd3a8c76131e8007374677ce5b6c0692de0a008e8c0ef5a68710063425739
                                                                                        • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __cftoe
                                                                                        • String ID:
                                                                                        • API String ID: 4189289331-0
                                                                                        • Opcode ID: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                                                                        • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                                        • Opcode Fuzzy Hash: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                                                                        • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                                        • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                        • String ID:
                                                                                        • API String ID: 493672254-0
                                                                                        • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                                                                        • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                                        • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                                                                        • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __alldvrm$_strrchr
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 1036877536-263838557
                                                                                        • Opcode ID: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                                                        • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                                        • Opcode Fuzzy Hash: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                                                        • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                                        • _free.LIBCMT ref: 0044824C
                                                                                        • _free.LIBCMT ref: 00448274
                                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                                        • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                                        • _abort.LIBCMT ref: 00448293
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                        • String ID:
                                                                                        • API String ID: 3160817290-0
                                                                                        • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                                        • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                                        • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                                        • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                        • String ID:
                                                                                        • API String ID: 221034970-0
                                                                                        • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                                                        • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                                        • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                                                        • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                                        • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                        • String ID:
                                                                                        • API String ID: 221034970-0
                                                                                        • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                                                                        • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                                        • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                                                                        • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                                        • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                        • String ID:
                                                                                        • API String ID: 221034970-0
                                                                                        • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                                                                        • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                                        • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                                                                        • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 0-263838557
                                                                                        • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                                        • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                                        • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                                        • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                        • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                                                                                        • CloseHandle.KERNEL32(?), ref: 00404DDB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 3360349984-263838557
                                                                                        • Opcode ID: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                                                                                        • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                                        • Opcode Fuzzy Hash: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                                                                                        • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                        • wsprintfW.USER32 ref: 0040B1F3
                                                                                          • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: EventLocalTimewsprintf
                                                                                        • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                        • API String ID: 1497725170-248792730
                                                                                        • Opcode ID: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                                                                                        • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                                        • Opcode Fuzzy Hash: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                                                                                        • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                                        • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CloseCreateHandleSizeSleep
                                                                                        • String ID: XQG
                                                                                        • API String ID: 1958988193-3606453820
                                                                                        • Opcode ID: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                                                                        • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                                        • Opcode Fuzzy Hash: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                                                                        • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                                        • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                                        • GetLastError.KERNEL32 ref: 0041D580
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ClassCreateErrorLastRegisterWindow
                                                                                        • String ID: 0$MsgWindowClass
                                                                                        • API String ID: 2877667751-2410386613
                                                                                        • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                                        • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                                        • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                                        • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                                        • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                                        • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                                        Strings
                                                                                        • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                                        • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandle$CreateProcess
                                                                                        • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                        • API String ID: 2922976086-4183131282
                                                                                        • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                                        • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                                        • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                                        • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        • C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe, xrefs: 004076C4
                                                                                        • SG, xrefs: 004076DA
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: SG$C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                        • API String ID: 0-2388126545
                                                                                        • Opcode ID: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                                                                        • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                                        • Opcode Fuzzy Hash: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                                                                        • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                                                                        • SetEvent.KERNEL32(?), ref: 0040512C
                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                                                                        • CloseHandle.KERNEL32(?), ref: 00405140
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                        • String ID: KeepAlive | Disabled
                                                                                        • API String ID: 2993684571-305739064
                                                                                        • Opcode ID: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                                                                        • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                                        • Opcode Fuzzy Hash: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                                                                        • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                                        • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                                        • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                                        • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                        • String ID: Alarm triggered
                                                                                        • API String ID: 614609389-2816303416
                                                                                        • Opcode ID: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                                                                                        • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                                        • Opcode Fuzzy Hash: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                                                                                        • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                                        • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                                                                        • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                                                                        • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                                                                        Strings
                                                                                        • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                        • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                        • API String ID: 3024135584-2418719853
                                                                                        • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                                        • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                                        • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                                        • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                                                                        • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                                        • Opcode Fuzzy Hash: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                                                                        • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                        • _free.LIBCMT ref: 00444E06
                                                                                        • _free.LIBCMT ref: 00444E1D
                                                                                        • _free.LIBCMT ref: 00444E3C
                                                                                        • _free.LIBCMT ref: 00444E57
                                                                                        • _free.LIBCMT ref: 00444E6E
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 3033488037-0
                                                                                        • Opcode ID: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                                                                                        • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                                        • Opcode Fuzzy Hash: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                                                                                        • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                                        • _free.LIBCMT ref: 004493BD
                                                                                          • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                          • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                        • _free.LIBCMT ref: 00449589
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                        • String ID:
                                                                                        • API String ID: 1286116820-0
                                                                                        • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                                        • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                                        • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                                        • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                                          • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                                          • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                          • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                        • String ID:
                                                                                        • API String ID: 4269425633-0
                                                                                        • Opcode ID: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                                                                        • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                                        • Opcode Fuzzy Hash: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                                                                        • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free
                                                                                        • String ID:
                                                                                        • API String ID: 269201875-0
                                                                                        • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                                        • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                                        • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                                        • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                                          • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                                        • _free.LIBCMT ref: 0044F3BF
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                        • String ID:
                                                                                        • API String ID: 336800556-0
                                                                                        • Opcode ID: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                                                                        • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                                        • Opcode Fuzzy Hash: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                                                                        • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C44D
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C459
                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000000,00406F85,00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C46A
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C477
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CloseHandle$CreatePointerWrite
                                                                                        • String ID:
                                                                                        • API String ID: 1852769593-0
                                                                                        • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                                        • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                                        • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                                        • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 004509D4
                                                                                          • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                          • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                        • _free.LIBCMT ref: 004509E6
                                                                                        • _free.LIBCMT ref: 004509F8
                                                                                        • _free.LIBCMT ref: 00450A0A
                                                                                        • _free.LIBCMT ref: 00450A1C
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                        • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                                        • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                        • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 00444066
                                                                                          • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                                          • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                                        • _free.LIBCMT ref: 00444078
                                                                                        • _free.LIBCMT ref: 0044408B
                                                                                        • _free.LIBCMT ref: 0044409C
                                                                                        • _free.LIBCMT ref: 004440AD
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                        • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                                        • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                        • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 0-263838557
                                                                                        • Opcode ID: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                                                                                        • Instruction ID: 56b21f6c39f874414c878b072b89285690216c2d241c0ad811085e1835033e53
                                                                                        • Opcode Fuzzy Hash: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                                                                                        • Instruction Fuzzy Hash: 1B51B271D00249AAEF14DFA9C885FAFBBB8EF45314F14015FE400A7291DB78D901CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _strpbrk.LIBCMT ref: 0044E738
                                                                                        • _free.LIBCMT ref: 0044E855
                                                                                          • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,?,?,?,?,?,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                                                                          • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD3D
                                                                                          • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000), ref: 0043BD44
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                        • String ID: *?$.
                                                                                        • API String ID: 2812119850-3972193922
                                                                                        • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                                        • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                                        • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                                        • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountEventTick
                                                                                        • String ID: !D@$NG
                                                                                        • API String ID: 180926312-2721294649
                                                                                        • Opcode ID: c3905e8113842b235930180e7962ad7fd0473fd9621d9de76edd9e6bfbddcfc2
                                                                                        • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                                        • Opcode Fuzzy Hash: c3905e8113842b235930180e7962ad7fd0473fd9621d9de76edd9e6bfbddcfc2
                                                                                        • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                                                          • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                                          • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                        • String ID: XQG$NG$PG
                                                                                        • API String ID: 1634807452-3565412412
                                                                                        • Opcode ID: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                                                                                        • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                                                        • Opcode Fuzzy Hash: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                                                                                        • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                        • String ID: `#D$`#D
                                                                                        • API String ID: 885266447-2450397995
                                                                                        • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                                        • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                                        • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                                        • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe,00000104), ref: 00443475
                                                                                        • _free.LIBCMT ref: 00443540
                                                                                        • _free.LIBCMT ref: 0044354A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$FileModuleName
                                                                                        • String ID: C:\Users\user\AppData\Roaming\mQpdTSxCjbPop.exe
                                                                                        • API String ID: 2506810119-1253301118
                                                                                        • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                                        • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                                        • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                                        • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BB7E,?,00000000,FF8BC35D), ref: 0044B8D2
                                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B900
                                                                                        • GetLastError.KERNEL32 ref: 0044B931
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 2456169464-263838557
                                                                                        • Opcode ID: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                                        • Instruction ID: a4f89274a665815b2d7bd0a52cbb4c71b9b2878c435ac706d73e761117ab6cd9
                                                                                        • Opcode Fuzzy Hash: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                                        • Instruction Fuzzy Hash: 18317271A002199FDB14DF59DC809EAB7B8EB48305F0444BEE90AD7260DB34ED80CBA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                          • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                                          • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                                          • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                                          • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                        • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                        • String ID: /sort "Visit Time" /stext "$0NG
                                                                                        • API String ID: 368326130-3219657780
                                                                                        • Opcode ID: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                                                                        • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                                        • Opcode Fuzzy Hash: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                                                                        • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _wcslen.LIBCMT ref: 004162F5
                                                                                          • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                                          • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                                          • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                                          • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _wcslen$CloseCreateValue
                                                                                        • String ID: !D@$okmode$PG
                                                                                        • API String ID: 3411444782-3370592832
                                                                                        • Opcode ID: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                                                                                        • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                                        • Opcode Fuzzy Hash: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                                                                                        • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                                        • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                                                                        Strings
                                                                                        • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExistsFilePath
                                                                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                        • API String ID: 1174141254-1980882731
                                                                                        • Opcode ID: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                                                                        • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                                        • Opcode Fuzzy Hash: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                                                                        • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                                        • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                                                                        Strings
                                                                                        • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExistsFilePath
                                                                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                        • API String ID: 1174141254-1980882731
                                                                                        • Opcode ID: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                                                                        • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                                        • Opcode Fuzzy Hash: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                                                                        • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A27D,004750F0,00000000,00000000), ref: 0040A1FE
                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A267,004750F0,00000000,00000000), ref: 0040A20E
                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A289,004750F0,00000000,00000000), ref: 0040A21A
                                                                                          • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                          • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateThread$LocalTimewsprintf
                                                                                        • String ID: Offline Keylogger Started
                                                                                        • API String ID: 465354869-4114347211
                                                                                        • Opcode ID: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                                                                        • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                                        • Opcode Fuzzy Hash: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                                                                        • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                          • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040AF6E
                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040AF7A
                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateThread$LocalTime$wsprintf
                                                                                        • String ID: Online Keylogger Started
                                                                                        • API String ID: 112202259-1258561607
                                                                                        • Opcode ID: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                                                                                        • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                                        • Opcode Fuzzy Hash: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                                                                                        • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LocalTime
                                                                                        • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                                                                        • API String ID: 481472006-3277280411
                                                                                        • Opcode ID: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                                                                        • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                                        • Opcode Fuzzy Hash: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                                                                        • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                                                        • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                                                                        Strings
                                                                                        • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Create$EventLocalThreadTime
                                                                                        • String ID: KeepAlive | Enabled | Timeout:
                                                                                        • API String ID: 2532271599-1507639952
                                                                                        • Opcode ID: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                                                                                        • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                                        • Opcode Fuzzy Hash: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                                                                                        • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: CryptUnprotectData$crypt32
                                                                                        • API String ID: 2574300362-2380590389
                                                                                        • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                                        • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                                        • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                                        • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C302,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C28C
                                                                                        • GetLastError.KERNEL32 ref: 0044C296
                                                                                        • __dosmaperr.LIBCMT ref: 0044C29D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer__dosmaperr
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 2336955059-263838557
                                                                                        • Opcode ID: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                                                                        • Instruction ID: 03228b3a5a263cac3d3762c0c6cb9bea0ee6cefe7ee70a3785aa569069518732
                                                                                        • Opcode Fuzzy Hash: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                                                                        • Instruction Fuzzy Hash: 9E016D32A11104BBDF008FE9CC4089E3719FB86320B28039AF810A7290EAB5DC118B64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                        • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                        • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseEventHandleObjectSingleWait
                                                                                        • String ID: Connection Timeout
                                                                                        • API String ID: 2055531096-499159329
                                                                                        • Opcode ID: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                                                                        • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                                        • Opcode Fuzzy Hash: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                                                                        • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Exception@8Throw
                                                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                        • API String ID: 2005118841-1866435925
                                                                                        • Opcode ID: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                                                                        • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                                        • Opcode Fuzzy Hash: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                                                                        • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB09
                                                                                        • LocalFree.KERNEL32(?,?), ref: 0041CB2F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FormatFreeLocalMessage
                                                                                        • String ID: @J@$PkGNG
                                                                                        • API String ID: 1427518018-1416487119
                                                                                        • Opcode ID: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                                                                        • Instruction ID: 02a9d8e2c753fe243ccbc909122ce1ddd8f8b45a09ed5088e6b723b988b0f700
                                                                                        • Opcode Fuzzy Hash: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                                                                        • Instruction Fuzzy Hash: 5EF0A434B0021AAADF08A7A6DD4ADFF7769DB84305B10007FB606B21D1EEB86D05D659
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041381F
                                                                                        • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,759237E0,?), ref: 0041384D
                                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,759237E0,?,?,?,?,?,0040CFAA,?,00000000), ref: 00413858
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041381D
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCreateValue
                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                        • API String ID: 1818849710-1051519024
                                                                                        • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                                        • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                                        • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                                        • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                                          • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                                          • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                        • String ID: bad locale name
                                                                                        • API String ID: 3628047217-1405518554
                                                                                        • Opcode ID: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                                                                                        • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                                        • Opcode Fuzzy Hash: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                                                                                        • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                                                                        • RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                                                                        • RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseCreateValue
                                                                                        • String ID: Control Panel\Desktop
                                                                                        • API String ID: 1818849710-27424756
                                                                                        • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                                        • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                                        • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                                        • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                                        • ShowWindow.USER32(00000009), ref: 00416C61
                                                                                        • SetForegroundWindow.USER32 ref: 00416C6D
                                                                                          • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                                          • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                                          • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                                                        • String ID: !D@
                                                                                        • API String ID: 3446828153-604454484
                                                                                        • Opcode ID: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                                                                                        • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                                        • Opcode Fuzzy Hash: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                                                                                        • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExecuteShell
                                                                                        • String ID: /C $cmd.exe$open
                                                                                        • API String ID: 587946157-3896048727
                                                                                        • Opcode ID: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                                                                        • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                                        • Opcode Fuzzy Hash: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                                                                        • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc
                                                                                        • String ID: GetCursorInfo$User32.dll
                                                                                        • API String ID: 1646373207-2714051624
                                                                                        • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                                        • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                                                        • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                                        • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressLibraryLoadProc
                                                                                        • String ID: GetLastInputInfo$User32.dll
                                                                                        • API String ID: 2574300362-1519888992
                                                                                        • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                                        • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                                                        • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                                        • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                                        • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                        • API String ID: 3472027048-1236744412
                                                                                        • Opcode ID: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                                                                        • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                                        • Opcode Fuzzy Hash: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                                                                        • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                                                                          • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                                          • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                                                                        • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                                        • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Window$SleepText$ForegroundLength
                                                                                        • String ID: [ $ ]
                                                                                        • API String ID: 3309952895-93608704
                                                                                        • Opcode ID: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                                                                        • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                                        • Opcode Fuzzy Hash: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                                                                        • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                                        • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                                        • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                                        • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                                        • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                                        • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                                        • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                                        • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4B2
                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4D7
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E74), ref: 0041C4E5
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: File$CloseCreateHandleReadSize
                                                                                        • String ID:
                                                                                        • API String ID: 3919263394-0
                                                                                        • Opcode ID: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                                                                        • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                                        • Opcode Fuzzy Hash: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                                                                        • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                                        • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CloseHandleOpenProcess
                                                                                        • String ID:
                                                                                        • API String ID: 39102293-0
                                                                                        • Opcode ID: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                                                                        • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                                        • Opcode Fuzzy Hash: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                                                                        • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                                          • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                                        • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                        • String ID:
                                                                                        • API String ID: 2633735394-0
                                                                                        • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                        • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                                        • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                        • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                                                                        • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                                                                        • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                                                                        • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem
                                                                                        • String ID:
                                                                                        • API String ID: 4116985748-0
                                                                                        • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                        • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                                        • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                        • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                                        • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                                          • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                        • String ID:
                                                                                        • API String ID: 1761009282-0
                                                                                        • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                        • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                                        • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                        • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorHandling__start
                                                                                        • String ID: pow
                                                                                        • API String ID: 3213639722-2276729525
                                                                                        • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                                        • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                                                        • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                                        • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F0F
                                                                                        • GetLastError.KERNEL32 ref: 00449F2B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharErrorLastMultiWide
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 203985260-263838557
                                                                                        • Opcode ID: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                                                                                        • Instruction ID: 5218313022fb824330162c1b3e1e252a07855a0508c927524b2412b0d5c8e50b
                                                                                        • Opcode Fuzzy Hash: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                                                                                        • Instruction Fuzzy Hash: A531F831600205EBEB21EF56C845BAB77A8DF55711F24416BF9048B3D1DB38CD41E7A9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                        • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Init_thread_footer__onexit
                                                                                        • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                        • API String ID: 1881088180-3686566968
                                                                                        • Opcode ID: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                                                                        • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                                        • Opcode Fuzzy Hash: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                                                                        • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ACP$OCP
                                                                                        • API String ID: 0-711371036
                                                                                        • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                                        • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                                        • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                                        • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B7DB
                                                                                        • GetLastError.KERNEL32 ref: 0044B804
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 442123175-263838557
                                                                                        • Opcode ID: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                                                                        • Instruction ID: 56933c973e2243a1a9a6e47b5ff38ff3048756f5123006952a384074424e161b
                                                                                        • Opcode Fuzzy Hash: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                                                                        • Instruction Fuzzy Hash: 12319331A00619DBCB24CF59CD809DAB3F9EF88311F1445AAE509D7361D734ED81CB68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B6ED
                                                                                        • GetLastError.KERNEL32 ref: 0044B716
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 442123175-263838557
                                                                                        • Opcode ID: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                                                                        • Instruction ID: 12ef57d8ab414bd2a6c5914f5c8b73f84ca543b1ee1fc2f1adbb6bb6aefc8993
                                                                                        • Opcode Fuzzy Hash: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                                                                        • Instruction Fuzzy Hash: 6C21B435600219DFCB14CF69C980BE9B3F8EB48302F1044AAE94AD7351D734ED81CB64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                                        Strings
                                                                                        • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LocalTime
                                                                                        • String ID: KeepAlive | Enabled | Timeout:
                                                                                        • API String ID: 481472006-1507639952
                                                                                        • Opcode ID: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                                                                                        • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                                        • Opcode Fuzzy Hash: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                                                                                        • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNEL32 ref: 00416640
                                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DownloadFileSleep
                                                                                        • String ID: !D@
                                                                                        • API String ID: 1931167962-604454484
                                                                                        • Opcode ID: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                                                                        • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                                        • Opcode Fuzzy Hash: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                                                                        • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExistsFilePath
                                                                                        • String ID: alarm.wav$hYG
                                                                                        • API String ID: 1174141254-2782910960
                                                                                        • Opcode ID: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                                                                                        • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                                                        • Opcode Fuzzy Hash: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                                                                                        • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                                          • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                                          • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                                        • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                                        • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                        • String ID: Online Keylogger Stopped
                                                                                        • API String ID: 1623830855-1496645233
                                                                                        • Opcode ID: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                                                                        • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                                        • Opcode Fuzzy Hash: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                                                                        • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,73E85006,00000001,?,0043CE55), ref: 00448C24
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: String
                                                                                        • String ID: LCMapStringEx$PkGNG
                                                                                        • API String ID: 2568140703-1065776982
                                                                                        • Opcode ID: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                                                                                        • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                                                                                        • Opcode Fuzzy Hash: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                                                                                        • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                                        • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wave$BufferHeaderPrepare
                                                                                        • String ID: XMG
                                                                                        • API String ID: 2315374483-813777761
                                                                                        • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                                        • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                        • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                                        • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LocaleValid
                                                                                        • String ID: IsValidLocaleName$JD
                                                                                        • API String ID: 1901932003-2234456777
                                                                                        • Opcode ID: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                                                                                        • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                                        • Opcode Fuzzy Hash: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                                                                                        • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExistsFilePath
                                                                                        • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                        • API String ID: 1174141254-4188645398
                                                                                        • Opcode ID: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                                                                        • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                                        • Opcode Fuzzy Hash: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                                                                        • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExistsFilePath
                                                                                        • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                        • API String ID: 1174141254-2800177040
                                                                                        • Opcode ID: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                                                                        • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                                        • Opcode Fuzzy Hash: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                                                                        • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExistsFilePath
                                                                                        • String ID: AppData$\Opera Software\Opera Stable\
                                                                                        • API String ID: 1174141254-1629609700
                                                                                        • Opcode ID: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                                                                        • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                                        • Opcode Fuzzy Hash: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                                                                        • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                                          • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                                                          • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                                          • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                                          • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                                          • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                                                          • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                                          • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                                          • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                        • String ID: [AltL]$[AltR]
                                                                                        • API String ID: 2738857842-2658077756
                                                                                        • Opcode ID: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                                                                        • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                                        • Opcode Fuzzy Hash: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                                                                        • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                                        • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: uD
                                                                                        • API String ID: 0-2547262877
                                                                                        • Opcode ID: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                                                                                        • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                                        • Opcode Fuzzy Hash: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                                                                                        • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Time$FileSystem
                                                                                        • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                                                                        • API String ID: 2086374402-949981407
                                                                                        • Opcode ID: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                                                                        • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                                                                        • Opcode Fuzzy Hash: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                                                                        • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExecuteShell
                                                                                        • String ID: !D@$open
                                                                                        • API String ID: 587946157-1586967515
                                                                                        • Opcode ID: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                                                                        • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                                        • Opcode Fuzzy Hash: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                                                                        • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___initconout.LIBCMT ref: 0045555B
                                                                                          • Part of subcall function 00456B1D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00455560,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000), ref: 00456B30
                                                                                        • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB19,?), ref: 0045557E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ConsoleCreateFileWrite___initconout
                                                                                        • String ID: PkGNG
                                                                                        • API String ID: 3087715906-263838557
                                                                                        • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                                                        • Instruction ID: e84ccb038854987deafcb7b601af55b429ad8f27f18c1f17be9b2782bd97289a
                                                                                        • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                                                        • Instruction Fuzzy Hash: 10E02B70500508BBD610CB64DC25EB63319EB003B1F600315FE25C72D1EB34DD44C759
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: State
                                                                                        • String ID: [CtrlL]$[CtrlR]
                                                                                        • API String ID: 1649606143-2446555240
                                                                                        • Opcode ID: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                                                                        • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                                        • Opcode Fuzzy Hash: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                                                                        • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                                        • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Init_thread_footer__onexit
                                                                                        • String ID: ,kG$0kG
                                                                                        • API String ID: 1881088180-2015055088
                                                                                        • Opcode ID: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                                        • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                                        • Opcode Fuzzy Hash: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                                        • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D4CE,00000000,?,00000000), ref: 00413A31
                                                                                        • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A45
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DeleteOpenValue
                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                        • API String ID: 2654517830-1051519024
                                                                                        • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                        • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                                        • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                        • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                                        • GetLastError.KERNEL32 ref: 00440D35
                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 1717984340-0
                                                                                        • Opcode ID: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                                                                                        • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                                        • Opcode Fuzzy Hash: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                                                                                        • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                                                                        • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                                                                        • SetLastError.KERNEL32(0000007F), ref: 00411C7A
                                                                                        • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000C.00000002.2043736617.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_12_2_400000_mQpdTSxCjbPop.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastRead
                                                                                        • String ID:
                                                                                        • API String ID: 4100373531-0
                                                                                        • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                                        • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                                        • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                                        • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 0040DDAD
                                                                                          • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                        • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                          • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                          • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                        • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                        • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                        • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                        • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                        • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                        • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                        • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                        • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                        • memset.MSVCRT ref: 0040DF5F
                                                                                        • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                        • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                        • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                                                                        • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                        • API String ID: 594330280-3398334509
                                                                                        • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                        • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                        • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                        • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                          • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                          • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                                                          • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                        • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                        • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                                                        • String ID:
                                                                                        • API String ID: 2947809556-0
                                                                                        • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                        • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                        • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                        • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                        • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 767404330-0
                                                                                        • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                        • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                        • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                        • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                        • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFind$FirstNext
                                                                                        • String ID:
                                                                                        • API String ID: 1690352074-0
                                                                                        • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                        • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                        • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                        • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 0041898C
                                                                                        • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoSystemmemset
                                                                                        • String ID:
                                                                                        • API String ID: 3558857096-0
                                                                                        • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                        • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                        • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                        • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 41 445823-445826 14->41 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 50 445879-44587c 18->50 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 82 445685 21->82 83 4456b2-4456b5 call 40b1ab 21->83 32 445605-445607 22->32 33 445603 22->33 30 4459f2-4459fa 23->30 31 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->31 133 44592d-445945 call 40b6ef 24->133 134 44594a 24->134 43 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 30->43 44 445b29-445b32 30->44 152 4459d0-4459e8 call 40b6ef 31->152 153 4459ed 31->153 32->21 37 445609-44560d 32->37 33->32 37->21 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 37->48 38->3 39->38 51 44584c-445854 call 40b1ab 41->51 52 445828 41->52 182 445b08-445b15 call 40ae51 43->182 53 445c7c-445c85 44->53 54 445b38-445b96 memset * 3 44->54 149 445665-445670 call 40b1ab 48->149 150 445643-445663 call 40a9b5 call 4087b3 48->150 64 4458a2-4458aa call 40b1ab 50->64 65 44587e 50->65 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 64->19 80 445884-44589d call 40a9b5 call 4087b3 65->80 136 445849 66->136 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 155 44589f 80->155 81->53 97 44568b-4456a4 call 40a9b5 call 4087b3 82->97 115 4456ba-4456c4 83->115 102 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->102 103 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->103 157 4456a9-4456b0 97->157 162 445d67-445d6c 102->162 163 445d71-445d83 call 445093 102->163 196 445e17 103->196 197 445e1e-445e25 103->197 128 4457f9 115->128 129 4456ca-4456d3 call 413cfa call 413d4c 115->129 128->6 172 4456d8-4456f7 call 40b2cc call 413fa6 129->172 133->134 134->23 136->51 149->115 150->149 152->153 153->30 155->64 157->83 157->97 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->44 201->182 218 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->218 242 445e62-445e69 202->242 243 445e5b 202->243 223 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->223 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->182 223->87 255 445f9b 223->255 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->223 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 004455C2
                                                                                        • wcsrchr.MSVCRT ref: 004455DA
                                                                                        • memset.MSVCRT ref: 0044570D
                                                                                        • memset.MSVCRT ref: 00445725
                                                                                          • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                          • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                          • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                          • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                          • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                                                          • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                          • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                                                          • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                        • memset.MSVCRT ref: 0044573D
                                                                                        • memset.MSVCRT ref: 00445755
                                                                                        • memset.MSVCRT ref: 004458CB
                                                                                        • memset.MSVCRT ref: 004458E3
                                                                                        • memset.MSVCRT ref: 0044596E
                                                                                        • memset.MSVCRT ref: 00445A10
                                                                                        • memset.MSVCRT ref: 00445A28
                                                                                        • memset.MSVCRT ref: 00445AC6
                                                                                          • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                          • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                          • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                          • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                                                          • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                        • memset.MSVCRT ref: 00445B52
                                                                                        • memset.MSVCRT ref: 00445B6A
                                                                                        • memset.MSVCRT ref: 00445C9B
                                                                                        • memset.MSVCRT ref: 00445CB3
                                                                                        • _wcsicmp.MSVCRT ref: 00445D56
                                                                                        • memset.MSVCRT ref: 00445B82
                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                          • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                          • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                          • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                          • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                        • memset.MSVCRT ref: 00445986
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                                                        • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                        • API String ID: 2745753283-3798722523
                                                                                        • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                        • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                        • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                        • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                          • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                          • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                          • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                        • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                        • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                        • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                        • String ID: $/deleteregkey$/savelangfile
                                                                                        • API String ID: 2744995895-28296030
                                                                                        • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                        • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                        • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                        • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 0040B71C
                                                                                          • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                          • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                        • wcsrchr.MSVCRT ref: 0040B738
                                                                                        • memset.MSVCRT ref: 0040B756
                                                                                        • memset.MSVCRT ref: 0040B7F5
                                                                                        • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                        • CopyFileW.KERNELBASE(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                        • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                        • memset.MSVCRT ref: 0040B851
                                                                                        • memset.MSVCRT ref: 0040B8CA
                                                                                        • memcmp.MSVCRT ref: 0040B9BF
                                                                                          • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                          • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                          • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                        • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                        • memset.MSVCRT ref: 0040BB53
                                                                                        • memcpy.MSVCRT ref: 0040BB66
                                                                                        • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateCryptDataDeleteFindLibraryLocalNotificationProcUnprotectmemcmpmemcpywcscpy
                                                                                        • String ID: chp$v10
                                                                                        • API String ID: 580435826-2783969131
                                                                                        • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                        • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                        • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                        • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                        • String ID:
                                                                                        • API String ID: 3715365532-3916222277
                                                                                        • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                        • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                        • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                        • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 FindCloseChangeNotification 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 ??3@YAXPAX@Z 585->588 590 413edb-413ee2 587->590 588->590 598 413ee4 590->598 599 413ee7-413efe 590->599 604 413ea2-413eae CloseHandle 592->604 596 413e61-413e68 593->596 597 413e37-413e44 GetModuleHandleW 593->597 596->592 600 413e6a-413e76 596->600 597->596 602 413e46-413e5c GetProcAddress 597->602 598->599 599->580 600->592 602->596 604->583
                                                                                        APIs
                                                                                          • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                                                        • memset.MSVCRT ref: 00413D7F
                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                        • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                        • memset.MSVCRT ref: 00413E07
                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                        • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                        • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,0000022C), ref: 00413F1A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@CloseHandleProcess32memset$AddressChangeCreateFindFirstModuleNextNotificationOpenProcProcessSnapshotToolhelp32
                                                                                        • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                        • API String ID: 2191996607-1740548384
                                                                                        • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                        • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                        • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                        • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                          • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                          • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                          • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                          • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                          • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                        • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                        • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                          • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                          • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                          • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                          • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                        • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                        • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                        • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                        • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                        • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                        • String ID: bhv
                                                                                        • API String ID: 327780389-2689659898
                                                                                        • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                        • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                        • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                        • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                                                        APIs
                                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                        • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                        • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                        • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                        • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                        • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                        • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                        • API String ID: 2941347001-70141382
                                                                                        • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                        • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                        • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                        • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 643 44671d-446726 641->643 644 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->644 646 446747-44674b 643->646 647 446728-44672d 643->647 652 4467ac-4467b7 __setusermatherr 644->652 653 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 644->653 646->642 648 44674d-44674f 646->648 647->642 650 446734-44673b 647->650 651 446755-446758 648->651 650->642 654 44673d-446745 650->654 651->644 652->653 657 446810-446819 653->657 658 44681e-446825 653->658 654->651 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 664 446834-446838 660->664 665 44683a-44683e 660->665 662 446845-44684b 661->662 663 446872-446877 661->663 667 446853-446864 GetStartupInfoW 662->667 668 44684d-446851 662->668 663->661 664->660 664->665 665->662 669 446840-446842 665->669 671 446866-44686a 667->671 672 446879-44687b 667->672 668->667 668->669 669->662 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                        • String ID:
                                                                                        • API String ID: 2827331108-0
                                                                                        • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                        • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                        • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                        • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 0040C298
                                                                                          • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                          • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                        • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                        • wcschr.MSVCRT ref: 0040C324
                                                                                        • wcschr.MSVCRT ref: 0040C344
                                                                                        • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                        • GetLastError.KERNEL32 ref: 0040C373
                                                                                        • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                        • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                        • String ID: visited:
                                                                                        • API String ID: 1157525455-1702587658
                                                                                        • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                        • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                        • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                        • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 ??3@YAXPAX@Z 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                                                                        APIs
                                                                                          • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                        • memset.MSVCRT ref: 0040E1BD
                                                                                          • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                                                          • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                          • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                          • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                        • _snwprintf.MSVCRT ref: 0040E257
                                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                          • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                                          • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                        • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                        • API String ID: 3883404497-2982631422
                                                                                        • Opcode ID: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                                                                                        • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                        • Opcode Fuzzy Hash: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                                                                                        • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                          • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                          • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                        • memset.MSVCRT ref: 0040BC75
                                                                                        • memset.MSVCRT ref: 0040BC8C
                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                        • memcmp.MSVCRT ref: 0040BCD6
                                                                                        • memcpy.MSVCRT ref: 0040BD2B
                                                                                        • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                                                                        • String ID:
                                                                                        • API String ID: 509814883-3916222277
                                                                                        • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                        • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                        • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                        • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError ??3@YAXPAX@Z 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 ??3@YAXPAX@Z 812->819 813->812 819->797
                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                        • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                        • GetLastError.KERNEL32 ref: 0041847E
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile$??3@ErrorLast
                                                                                        • String ID: |A
                                                                                        • API String ID: 1407640353-1717621600
                                                                                        • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                        • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                        • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                        • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                        • String ID: r!A
                                                                                        • API String ID: 2791114272-628097481
                                                                                        • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                        • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                        • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                        • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                          • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                                                          • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                                                          • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                                                          • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                          • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                          • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                          • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                          • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                          • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                          • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                          • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                          • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                          • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                          • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                        • _wcslwr.MSVCRT ref: 0040C817
                                                                                          • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                          • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                        • wcslen.MSVCRT ref: 0040C82C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                        • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                        • API String ID: 62308376-4196376884
                                                                                        • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                        • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                        • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                        • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                        • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                        • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                        • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                        • memcpy.MSVCRT ref: 0040B60D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                        • String ID: BIN
                                                                                        • API String ID: 1668488027-1015027815
                                                                                        • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                        • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                        • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                        • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                          • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                        • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                        • wcslen.MSVCRT ref: 0040BE06
                                                                                        • _wcsncoll.MSVCRT ref: 0040BE38
                                                                                        • memset.MSVCRT ref: 0040BE91
                                                                                        • memcpy.MSVCRT ref: 0040BEB2
                                                                                        • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                        • wcschr.MSVCRT ref: 0040BF24
                                                                                        • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                                                                        • String ID:
                                                                                        • API String ID: 3191383707-0
                                                                                        • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                        • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                        • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                        • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 00403CBF
                                                                                        • memset.MSVCRT ref: 00403CD4
                                                                                        • memset.MSVCRT ref: 00403CE9
                                                                                        • memset.MSVCRT ref: 00403CFE
                                                                                        • memset.MSVCRT ref: 00403D13
                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                        • memset.MSVCRT ref: 00403DDA
                                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                        • String ID: Waterfox$Waterfox\Profiles
                                                                                        • API String ID: 3527940856-11920434
                                                                                        • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                        • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                        • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                        • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 00403E50
                                                                                        • memset.MSVCRT ref: 00403E65
                                                                                        • memset.MSVCRT ref: 00403E7A
                                                                                        • memset.MSVCRT ref: 00403E8F
                                                                                        • memset.MSVCRT ref: 00403EA4
                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                        • memset.MSVCRT ref: 00403F6B
                                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                        • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                        • API String ID: 3527940856-2068335096
                                                                                        • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                        • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                        • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                        • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 00403FE1
                                                                                        • memset.MSVCRT ref: 00403FF6
                                                                                        • memset.MSVCRT ref: 0040400B
                                                                                        • memset.MSVCRT ref: 00404020
                                                                                        • memset.MSVCRT ref: 00404035
                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                          • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                          • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                          • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                        • memset.MSVCRT ref: 004040FC
                                                                                          • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                          • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                        • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                        • API String ID: 3527940856-3369679110
                                                                                        • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                        • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                        • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                        • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcpy
                                                                                        • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                        • API String ID: 3510742995-2641926074
                                                                                        • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                        • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                        • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                        • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                                                          • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                          • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                        • memset.MSVCRT ref: 004033B7
                                                                                        • memcpy.MSVCRT ref: 004033D0
                                                                                        • wcscmp.MSVCRT ref: 004033FC
                                                                                        • _wcsicmp.MSVCRT ref: 00403439
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                                                        • String ID: $0.@
                                                                                        • API String ID: 3030842498-1896041820
                                                                                        • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                        • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                        • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                        • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 2941347001-0
                                                                                        • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                        • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                        • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                        • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 00403C09
                                                                                        • memset.MSVCRT ref: 00403C1E
                                                                                          • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                          • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                        • wcscat.MSVCRT ref: 00403C47
                                                                                          • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                          • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                          • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                        • wcscat.MSVCRT ref: 00403C70
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memsetwcscat$Closewcscpywcslen
                                                                                        • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                        • API String ID: 3249829328-1174173950
                                                                                        • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                        • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                        • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                        • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 0040A824
                                                                                        • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                        • wcscpy.MSVCRT ref: 0040A854
                                                                                        • wcscat.MSVCRT ref: 0040A86A
                                                                                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                        • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 669240632-0
                                                                                        • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                        • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                        • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                        • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • wcschr.MSVCRT ref: 00414458
                                                                                        • _snwprintf.MSVCRT ref: 0041447D
                                                                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                        • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                        • String ID: "%s"
                                                                                        • API String ID: 1343145685-3297466227
                                                                                        • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                        • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                        • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                        • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                        • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                        • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProcProcessTimes
                                                                                        • String ID: GetProcessTimes$kernel32.dll
                                                                                        • API String ID: 1714573020-3385500049
                                                                                        • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                        • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                        • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                        • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 004087D6
                                                                                          • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                          • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                        • memset.MSVCRT ref: 00408828
                                                                                        • memset.MSVCRT ref: 00408840
                                                                                        • memset.MSVCRT ref: 00408858
                                                                                        • memset.MSVCRT ref: 00408870
                                                                                        • memset.MSVCRT ref: 00408888
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 2911713577-0
                                                                                        • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                        • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                        • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                        • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp
                                                                                        • String ID: @ $SQLite format 3
                                                                                        • API String ID: 1475443563-3708268960
                                                                                        • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                        • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                        • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                        • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                        • memset.MSVCRT ref: 00414C87
                                                                                        • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                        • wcscpy.MSVCRT ref: 00414CFC
                                                                                          • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                        Strings
                                                                                        • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressCloseProcVersionmemsetwcscpy
                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                        • API String ID: 2705122986-2036018995
                                                                                        • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                        • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                        • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                        • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcsicmpqsort
                                                                                        • String ID: /nosort$/sort
                                                                                        • API String ID: 1579243037-1578091866
                                                                                        • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                        • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                        • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                        • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 0040E60F
                                                                                        • memset.MSVCRT ref: 0040E629
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                        Strings
                                                                                        • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                        • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                        • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                        • API String ID: 3354267031-2114579845
                                                                                        • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                        • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                        • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                        • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                        • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                        • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                        • String ID:
                                                                                        • API String ID: 3473537107-0
                                                                                        • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                        • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                        • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                        • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@
                                                                                        • String ID:
                                                                                        • API String ID: 613200358-0
                                                                                        • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                        • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                        • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                        • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset
                                                                                        • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                        • API String ID: 2221118986-1725073988
                                                                                        • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                        • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                        • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                        • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                        • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeCloseFindNotificationSleep
                                                                                        • String ID: }A
                                                                                        • API String ID: 1821831730-2138825249
                                                                                        • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                        • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                        • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                        • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@DeleteObject
                                                                                        • String ID: r!A
                                                                                        • API String ID: 1103273653-628097481
                                                                                        • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                        • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                        • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                        • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??2@
                                                                                        • String ID:
                                                                                        • API String ID: 1033339047-0
                                                                                        • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                        • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                        • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                        • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                          • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                        • memcmp.MSVCRT ref: 00444BA5
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$memcmp
                                                                                        • String ID: $$8
                                                                                        • API String ID: 2808797137-435121686
                                                                                        • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                        • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                        • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                        • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                          • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                          • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                          • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                          • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                          • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                          • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                          • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                          • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                                                        • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                          • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                          • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                          • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                                                        • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                        • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                          • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                          • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                          • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                                                        • String ID:
                                                                                        • API String ID: 1042154641-0
                                                                                        • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                        • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                        • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                        • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                          • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                          • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                          • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                        • memset.MSVCRT ref: 00403A55
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                          • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                                          • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                                          • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                                                        • String ID: history.dat$places.sqlite
                                                                                        • API String ID: 3093078384-467022611
                                                                                        • Opcode ID: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                                                                                        • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                        • Opcode Fuzzy Hash: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                                                                                        • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                          • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                          • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                        • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                        • GetLastError.KERNEL32 ref: 00417627
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$File$PointerRead
                                                                                        • String ID:
                                                                                        • API String ID: 839530781-0
                                                                                        • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                        • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                        • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                        • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFindFirst
                                                                                        • String ID: *.*$index.dat
                                                                                        • API String ID: 1974802433-2863569691
                                                                                        • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                        • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                        • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                        • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@mallocmemcpy
                                                                                        • String ID:
                                                                                        • API String ID: 3831604043-0
                                                                                        • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                        • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                        • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                        • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                        • GetLastError.KERNEL32 ref: 004175A2
                                                                                        • GetLastError.KERNEL32 ref: 004175A8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$FilePointer
                                                                                        • String ID:
                                                                                        • API String ID: 1156039329-0
                                                                                        • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                        • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                        • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                        • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                        • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                        • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$ChangeCloseCreateFindNotificationTime
                                                                                        • String ID:
                                                                                        • API String ID: 1631957507-0
                                                                                        • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                        • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                        • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                        • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                        • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                        • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Temp$DirectoryFileNamePathWindows
                                                                                        • String ID:
                                                                                        • API String ID: 1125800050-0
                                                                                        • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                        • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                        • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                        • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: d
                                                                                        • API String ID: 0-2564639436
                                                                                        • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                        • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                        • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                        • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset
                                                                                        • String ID: BINARY
                                                                                        • API String ID: 2221118986-907554435
                                                                                        • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                        • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                        • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                        • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                                                          • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                                                        • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                                                                          • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                          • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                          • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                          • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                                                                        • String ID:
                                                                                        • API String ID: 1161345128-0
                                                                                        • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                        • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                        • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                        • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcsicmp
                                                                                        • String ID: /stext
                                                                                        • API String ID: 2081463915-3817206916
                                                                                        • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                        • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                        • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                        • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                        • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                          • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                          • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                          • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                        • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                          • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                                                                        • String ID:
                                                                                        • API String ID: 159017214-0
                                                                                        • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                        • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                        • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                        • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: malloc
                                                                                        • String ID: failed to allocate %u bytes of memory
                                                                                        • API String ID: 2803490479-1168259600
                                                                                        • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                        • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                        • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                        • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@
                                                                                        • String ID:
                                                                                        • API String ID: 613200358-0
                                                                                        • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                        • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                        • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                        • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmpmemset
                                                                                        • String ID:
                                                                                        • API String ID: 1065087418-0
                                                                                        • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                        • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                        • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                        • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset
                                                                                        • String ID:
                                                                                        • API String ID: 2221118986-0
                                                                                        • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                        • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                        • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                        • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                          • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                          • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                          • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                        • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                                                                        • String ID:
                                                                                        • API String ID: 1481295809-0
                                                                                        • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                        • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                        • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                        • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                          • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                          • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                          • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                          • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                          • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 3150196962-0
                                                                                        • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                        • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                        • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                        • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$PointerRead
                                                                                        • String ID:
                                                                                        • API String ID: 3154509469-0
                                                                                        • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                        • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                        • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                        • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                          • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                          • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                          • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                        • String ID:
                                                                                        • API String ID: 4232544981-0
                                                                                        • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                        • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                        • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                        • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID:
                                                                                        • API String ID: 3664257935-0
                                                                                        • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                        • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                        • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                        • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                          • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                        • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$FileModuleName
                                                                                        • String ID:
                                                                                        • API String ID: 3859505661-0
                                                                                        • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                        • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                        • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                        • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileRead
                                                                                        • String ID:
                                                                                        • API String ID: 2738559852-0
                                                                                        • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                        • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                        • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                        • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3934441357-0
                                                                                        • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                        • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                        • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                        • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID:
                                                                                        • API String ID: 3664257935-0
                                                                                        • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                        • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                        • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                        • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@
                                                                                        • String ID:
                                                                                        • API String ID: 613200358-0
                                                                                        • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                        • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                        • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                        • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                        • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                        • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                        • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateFile
                                                                                        • String ID:
                                                                                        • API String ID: 823142352-0
                                                                                        • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                        • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                        • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                        • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@
                                                                                        • String ID:
                                                                                        • API String ID: 613200358-0
                                                                                        • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                        • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                        • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                        • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@
                                                                                        • String ID:
                                                                                        • API String ID: 613200358-0
                                                                                        • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                        • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                        • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                        • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID:
                                                                                        • API String ID: 3664257935-0
                                                                                        • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                        • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                        • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                        • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnumNamesResource
                                                                                        • String ID:
                                                                                        • API String ID: 3334572018-0
                                                                                        • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                        • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                        • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                        • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID:
                                                                                        • API String ID: 3664257935-0
                                                                                        • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                        • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                        • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                        • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFind
                                                                                        • String ID:
                                                                                        • API String ID: 1863332320-0
                                                                                        • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                        • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                        • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                        • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Open
                                                                                        • String ID:
                                                                                        • API String ID: 71445658-0
                                                                                        • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                        • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                        • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                        • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID:
                                                                                        • API String ID: 3188754299-0
                                                                                        • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                        • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                        • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                        • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@
                                                                                        • String ID:
                                                                                        • API String ID: 613200358-0
                                                                                        • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                        • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                        • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                        • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                        • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                        • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                        • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 004095FC
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                          • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                                                          • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                        • String ID:
                                                                                        • API String ID: 3655998216-0
                                                                                        • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                        • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                        • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                        • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 00445426
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                          • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                          • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                          • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                          • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                          • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                          • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                          • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                        • String ID:
                                                                                        • API String ID: 1828521557-0
                                                                                        • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                        • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                        • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                        • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: _wcsicmp
                                                                                        • String ID:
                                                                                        • API String ID: 2081463915-0
                                                                                        • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                        • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                        • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                        • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                        • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CloseCreateErrorHandleLastRead
                                                                                        • String ID:
                                                                                        • API String ID: 2136311172-0
                                                                                        • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                        • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                        • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                        • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                                                        • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??2@??3@
                                                                                        • String ID:
                                                                                        • API String ID: 1936579350-0
                                                                                        • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                        • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                        • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                        • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                        • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                        • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                        • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                        • GetDC.USER32 ref: 004140E3
                                                                                        • wcslen.MSVCRT ref: 00414123
                                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                        • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                        • _snwprintf.MSVCRT ref: 00414244
                                                                                        • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                        • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                        • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                        • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                        • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                        • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                        • String ID: %s:$EDIT$STATIC
                                                                                        • API String ID: 2080319088-3046471546
                                                                                        • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                        • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                        • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                        • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                          • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                          • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                          • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                                                        • memcpy.MSVCRT ref: 0040C11B
                                                                                        • strchr.MSVCRT ref: 0040C140
                                                                                        • strchr.MSVCRT ref: 0040C151
                                                                                        • _strlwr.MSVCRT ref: 0040C15F
                                                                                        • memset.MSVCRT ref: 0040C17A
                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                        • String ID: 4$h
                                                                                        • API String ID: 4066021378-1856150674
                                                                                        • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                        • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                        • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                        • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                        • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                        • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                        • GetTickCount.KERNEL32 ref: 0040610B
                                                                                        • GetParent.USER32(?), ref: 00406136
                                                                                        • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                        • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                        • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                        • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                        • String ID: A
                                                                                        • API String ID: 2892645895-3554254475
                                                                                        • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                        • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                        • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                        • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                        • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                        • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                        • wcscpy.MSVCRT ref: 0040A0D9
                                                                                        • wcscat.MSVCRT ref: 0040A0E6
                                                                                        • wcscat.MSVCRT ref: 0040A0F5
                                                                                        • wcscpy.MSVCRT ref: 0040A107
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1331804452-0
                                                                                        • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                        • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                        • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                        • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                        • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                        • <%s>, xrefs: 004100A6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$_snwprintf
                                                                                        • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                        • API String ID: 3473751417-2880344631
                                                                                        • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                        • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                        • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                        • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                        • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                                        • memset.MSVCRT ref: 004450CD
                                                                                          • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                                                          • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                                                          • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                                                        • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                        • String ID:
                                                                                        • API String ID: 1471605966-0
                                                                                        • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                        • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                        • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                        • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 004100FB
                                                                                        • memset.MSVCRT ref: 00410112
                                                                                          • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                          • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                        • _snwprintf.MSVCRT ref: 00410141
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                        • String ID: </%s>
                                                                                        • API String ID: 3400436232-259020660
                                                                                        • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                        • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                        • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                        • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memset.MSVCRT ref: 00412057
                                                                                          • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                        • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                        • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                        • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                        • String ID:
                                                                                        • API String ID: 3550944819-0
                                                                                        • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                        • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                        • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                        • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • strlen.MSVCRT ref: 0040B0D8
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                                                          • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                          • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                                                          • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                                                        • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                                                        • memcpy.MSVCRT ref: 0040B159
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.2198588685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_400000_proof of paymentt.jbxd
                                                                                        Similarity
                                                                                        • API ID: ??3@$memcpy$mallocstrlen
                                                                                        • String ID:
                                                                                        • API String ID: 1171893557-0
                                                                                        • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                        • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                        • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                        • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%