Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BKG#SGN2106728.PDF.exe

Overview

General Information

Sample name:BKG#SGN2106728.PDF.exe
Analysis ID:1427946
MD5:ccdb29c0d8e287cad8644e0adfd56178
SHA1:3b5534a7af776ec14a07dbe81cde5bdbb538dce8
SHA256:cb06339a87bdd6284086a97545c32dc8a3eb3701c7642543e7c327d0539005f9
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • BKG#SGN2106728.PDF.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • powershell.exe (PID: 7036 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7316 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • powershell.exe (PID: 4996 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7032 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • BKG#SGN2106728.PDF.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • BKG#SGN2106728.PDF.exe (PID: 4348 cmdline: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • BKG#SGN2106728.PDF.exe (PID: 332 cmdline: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
  • eDnxmGWzJ.exe (PID: 7276 cmdline: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • schtasks.exe (PID: 7460 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • eDnxmGWzJ.exe (PID: 7516 cmdline: "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • eDnxmGWzJ.exe (PID: 7524 cmdline: "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
  • BjTxJte.exe (PID: 7788 cmdline: "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • schtasks.exe (PID: 7928 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • BjTxJte.exe (PID: 7980 cmdline: "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • BjTxJte.exe (PID: 7988 cmdline: "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • BjTxJte.exe (PID: 7996 cmdline: "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
  • BjTxJte.exe (PID: 8172 cmdline: "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
    • schtasks.exe (PID: 5480 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • BjTxJte.exe (PID: 6180 cmdline: "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe" MD5: CCDB29C0D8E287CAD8644E0ADFD56178)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.flexwelltour.com", "Username": "info@flexwelltour.com", "Password": "w$5DC?c5"}
SourceRuleDescriptionAuthorStrings
0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 33 entries
            SourceRuleDescriptionAuthorStrings
            0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33b7c:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33bee:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33c78:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33d0a:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x33d74:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x33de6:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33e7c:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33f0c:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                10.2.eDnxmGWzJ.exe.399fde0.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  10.2.eDnxmGWzJ.exe.399fde0.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 21 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, NewProcessName: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, OriginalFileName: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ProcessId: 6768, ProcessName: BKG#SGN2106728.PDF.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ParentImage: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ParentProcessId: 6768, ParentProcessName: BKG#SGN2106728.PDF.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ProcessId: 7036, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ProcessId: 332, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BjTxJte
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ParentImage: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ParentProcessId: 6768, ParentProcessName: BKG#SGN2106728.PDF.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ProcessId: 7036, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe, ParentImage: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe, ParentProcessId: 7276, ParentProcessName: eDnxmGWzJ.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp", ProcessId: 7460, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 94.199.200.238, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, Initiated: true, ProcessId: 332, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ParentImage: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ParentProcessId: 6768, ParentProcessName: BKG#SGN2106728.PDF.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp", ProcessId: 7032, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ParentImage: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ParentProcessId: 6768, ParentProcessName: BKG#SGN2106728.PDF.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ProcessId: 7036, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe", ParentImage: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe, ParentProcessId: 6768, ParentProcessName: BKG#SGN2106728.PDF.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp", ProcessId: 7032, ProcessName: schtasks.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: BKG#SGN2106728.PDF.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeAvira: detection malicious, Label: HEUR/AGEN.1323731
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeAvira: detection malicious, Label: HEUR/AGEN.1323731
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.flexwelltour.com", "Username": "info@flexwelltour.com", "Password": "w$5DC?c5"}
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeVirustotal: Detection: 43%Perma Link
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeVirustotal: Detection: 43%Perma Link
                    Source: BKG#SGN2106728.PDF.exeVirustotal: Detection: 43%Perma Link
                    Source: BKG#SGN2106728.PDF.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeJoe Sandbox ML: detected
                    Source: BKG#SGN2106728.PDF.exeJoe Sandbox ML: detected
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49739 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49741 version: TLS 1.2
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 94.199.200.238:587
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 94.199.200.238:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.ipify.org
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000031DB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034EB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034A7000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://flexwelltour.com
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000031DB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034EB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034A7000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.flexwelltour.com
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2962504711.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0L
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2962504711.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1747954818.0000000002C3B000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000A.00000002.1809479007.00000000028D2000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000011.00000002.1921505605.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000019.00000002.2003324584.000000000312B000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2985822507.0000000007F90000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.00000000015A1000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001380000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001367000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: BjTxJte.exe, 0000001C.00000002.2962504711.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.len
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2985822507.0000000007F90000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.00000000015A1000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001380000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001367000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49739 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49741 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, cPKWk.cs.Net Code: O7h
                    Source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpack, cPKWk.cs.Net Code: O7h
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWindow created: window name: CLIPBRDWNDCLASS
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindow created: window name: CLIPBRDWNDCLASS
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindow created: window name: CLIPBRDWNDCLASS
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071C80D8 GetKeyState,GetKeyState,GetKeyState,15_2_071C80D8
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071C80C8 GetKeyState,GetKeyState,GetKeyState,15_2_071C80C8

                    System Summary

                    barindex
                    Source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.eDnxmGWzJ.exe.399fde0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.eDnxmGWzJ.exe.399fde0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.BKG#SGN2106728.PDF.exe.5400000.4.raw.unpack, LoginForm.csLarge array initialization: : array initializer size 33603
                    Source: initial sampleStatic PE information: Filename: BKG#SGN2106728.PDF.exe
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E84300_2_010E8430
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E88110_2_010E8811
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E70000_2_010E7000
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E73400_2_010E7340
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E84D10_2_010E84D1
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E732E0_2_010E732E
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_010E78780_2_010E7878
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A47580_2_012A4758
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A71780_2_012A7178
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A001E0_2_012A001E
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A00400_2_012A0040
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A47490_2_012A4749
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A09180_2_012A0918
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014A41F89_2_014A41F8
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014AA9989_2_014AA998
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014AEB719_2_014AEB71
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014A4AC89_2_014A4AC8
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014A3EB09_2_014A3EB0
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014AADF09_2_014AADF0
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D434689_2_06D43468
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D465C09_2_06D465C0
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D455A89_2_06D455A8
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D47D409_2_06D47D40
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D4B1F89_2_06D4B1F8
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D476609_2_06D47660
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D45CAB9_2_06D45CAB
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D4E3789_2_06D4E378
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D400409_2_06D40040
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06E320039_2_06E32003
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06E320089_2_06E32008
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06D400069_2_06D40006
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_0104842210_2_01048422
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_0104700010_2_01047000
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_0104734010_2_01047340
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010484D110_2_010484D1
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_0104732E10_2_0104732E
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_0104787810_2_01047878
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010A395A10_2_010A395A
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010A003010_2_010A0030
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010A004010_2_010A0040
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010A63F010_2_010A63F0
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010A091810_2_010A0918
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_010A39C510_2_010A39C5
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A046810_2_080A0468
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A078010_2_080A0780
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A70B510_2_080A70B5
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080AE88010_2_080AE880
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080AECB810_2_080AECB8
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080AE44810_2_080AE448
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A045810_2_080A0458
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A077110_2_080A0771
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A5CF010_2_080A5CF0
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A5D0010_2_080A5D00
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 10_2_080A16E810_2_080A16E8
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018D41F815_2_018D41F8
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018DA99815_2_018DA998
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018D4AC815_2_018D4AC8
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018DADE215_2_018DADE2
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018D3EB015_2_018D3EB0
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018DEC5915_2_018DEC59
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_06F1346015_2_06F13460
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_06F1765815_2_06F17658
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_06F1004015_2_06F10040
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_06F1000615_2_06F10006
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_0700200215_2_07002002
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_0700200815_2_07002008
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071C5BD115_2_071C5BD1
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071C07F415_2_071C07F4
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071CDC3815_2_071CDC38
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071CDC2815_2_071CDC28
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9843017_2_00D98430
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9875817_2_00D98758
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9700017_2_00D97000
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9734017_2_00D97340
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D984D117_2_00D984D1
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9737A17_2_00D9737A
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9732E17_2_00D9732E
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_00D9787817_2_00D97878
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0489395A17_2_0489395A
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0489209117_2_04892091
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0489000717_2_04890007
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0489004017_2_04890040
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_048963F017_2_048963F0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_048939C517_2_048939C5
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0489091817_2_04890918
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549E44817_2_0549E448
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549045817_2_05490458
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549046817_2_05490468
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549E42E17_2_0549E42E
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549077117_2_05490771
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549078017_2_05490780
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549ECB817_2_0549ECB8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549E87017_2_0549E870
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549E88017_2_0549E880
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_0549B7A017_2_0549B7A0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_05495D0017_2_05495D00
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_05495CF017_2_05495CF0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 17_2_05499BB217_2_05499BB2
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_014641F822_2_014641F8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_0146EA6022_2_0146EA60
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_01464AC822_2_01464AC8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_0146ACD022_2_0146ACD0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_01463EB022_2_01463EB0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE346822_2_06AE3468
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE55A822_2_06AE55A8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE65C022_2_06AE65C0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE7D4022_2_06AE7D40
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AEB20822_2_06AEB208
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE766022_2_06AE7660
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE5CC022_2_06AE5CC0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AEE37822_2_06AEE378
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE004022_2_06AE0040
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06BD1DC822_2_06BD1DC8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06BD1DC222_2_06BD1DC2
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06AE000622_2_06AE0006
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_02ED39D125_2_02ED39D1
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_02ED633025_2_02ED6330
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_02ED004025_2_02ED0040
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_02ED091825_2_02ED0918
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309875825_2_03098758
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309842225_2_03098422
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309734025_2_03097340
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309700025_2_03097000
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_030984D125_2_030984D1
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309732E25_2_0309732E
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309737A25_2_0309737A
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_0309787825_2_03097878
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD046825_2_08AD0468
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD078025_2_08AD0780
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD70B525_2_08AD70B5
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08ADE88025_2_08ADE880
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08ADECB825_2_08ADECB8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08ADE44825_2_08ADE448
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD045825_2_08AD0458
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD077125_2_08AD0771
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD794225_2_08AD7942
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD795025_2_08AD7950
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD5CF025_2_08AD5CF0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD5D0025_2_08AD5D00
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08ADF26825_2_08ADF268
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD16E825_2_08AD16E8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_08AD16D925_2_08AD16D9
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015EEA5128_2_015EEA51
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015E4AC828_2_015E4AC8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015EACC228_2_015EACC2
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015E3EB028_2_015E3EB0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015E41F828_2_015E41F8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA346828_2_06DA3468
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA65C028_2_06DA65C0
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA55A828_2_06DA55A8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA7D4028_2_06DA7D40
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DAB1F828_2_06DAB1F8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA766028_2_06DA7660
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA5CAB28_2_06DA5CAB
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DAE37828_2_06DAE378
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA004028_2_06DA0040
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06E91DC828_2_06E91DC8
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06E91DC328_2_06E91DC3
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06DA000728_2_06DA0007
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1747954818.0000000002CD4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename3a3d57e0-9612-4728-98de-585016f919fc.exe4 vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1746563839.0000000000EEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename3a3d57e0-9612-4728-98de-585016f919fc.exe4 vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1752259649.0000000005400000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename3a3d57e0-9612-4728-98de-585016f919fc.exe4 vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000000.00000002.1753765317.00000000088A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2927080035.0000000001138000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exeBinary or memory string: OriginalFilenameHfcxg.exeT vs BKG#SGN2106728.PDF.exe
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.eDnxmGWzJ.exe.399fde0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.eDnxmGWzJ.exe.399fde0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: eDnxmGWzJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, hbZNRJKn3pZuk9vCcl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, hbZNRJKn3pZuk9vCcl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, jltxWJLFOkrowWdHRa.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, hbZNRJKn3pZuk9vCcl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@41/20@2/2
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7936:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3168:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7232:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMutant created: \Sessions\1\BaseNamedObjects\dgxgXtThNJPtdK
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4456:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2044:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5779.tmpJump to behavior
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: BKG#SGN2106728.PDF.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: BKG#SGN2106728.PDF.exeVirustotal: Detection: 43%
                    Source: BKG#SGN2106728.PDF.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile read: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeSection loaded: edputil.dll
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, jltxWJLFOkrowWdHRa.cs.Net Code: pcNqjD8lAw System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, jltxWJLFOkrowWdHRa.cs.Net Code: pcNqjD8lAw System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, jltxWJLFOkrowWdHRa.cs.Net Code: pcNqjD8lAw System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.BKG#SGN2106728.PDF.exe.5400000.4.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 0_2_012A1912 push ecx; ret 0_2_012A191C
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_014A0B4D push edi; ret 9_2_014A0CC2
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06E381BD push esp; iretd 9_2_06E381C5
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06E31698 pushfd ; ret 9_2_06E3169C
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeCode function: 9_2_06E37580 push esp; iretd 9_2_06E37589
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018D0B4D push edi; ret 15_2_018D0CC2
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_018D0C95 push edi; retf 15_2_018D0C3A
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_070081BD push esp; iretd 15_2_070081C5
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_07007590 push esp; iretd 15_2_07007599
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_070071C2 push es; ret 15_2_070071D0
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeCode function: 15_2_071C4EF3 push dword ptr [ecx+ecx-75h]; iretd 15_2_071C4F03
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_0146A2A2 pushad ; ret 22_2_0146A2A9
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_01460C3D push edi; ret 22_2_01460CC2
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_01460C95 push edi; retf 22_2_01460C3A
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06BD1653 push cs; retf 22_2_06BD165B
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06BD7350 push esp; iretd 22_2_06BD7359
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 22_2_06BD7F7D push esp; iretd 22_2_06BD7F85
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 25_2_02ED1912 push ecx; ret 25_2_02ED191C
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015EA2A2 pushad ; ret 28_2_015EA2A9
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015E0C3D push edi; ret 28_2_015E0CC2
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_015E0C95 push edi; retf 28_2_015E0C3A
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06E91658 push cs; retf 28_2_06E9165B
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06E97350 push esp; iretd 28_2_06E97359
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeCode function: 28_2_06E97F7D push esp; iretd 28_2_06E97F85
                    Source: BKG#SGN2106728.PDF.exeStatic PE information: section name: .text entropy: 7.962537044370944
                    Source: eDnxmGWzJ.exe.0.drStatic PE information: section name: .text entropy: 7.962537044370944
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, jwvBObYx4KVfbRPv8H.csHigh entropy of concatenated method names: 'dNitCBtyDX', 'LGxtKyc2Gf', 'DtStBGq7Dl', 'Kdrt0CgSW4', 'RxYtOuOUBA', 'aJNt4TKylH', 'ruLyIUVPrB4ueT7al4', 'TQppsVRICj7DY6vPLK', 'XNjtt2Uy2r', 'eU9tLcgiPM'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, O6JYRBbGpphBJ1wiTr.csHigh entropy of concatenated method names: 'aUYhEDxDLg', 'jkUhlEPtOR', 'KF3hnKYmbg', 'qlEhuWfPdf', 'gXEhOMMUeu', 'qGeh4gPbUF', 'RAAhsQnnWg', 'BbOhrhdd7v', 'TOJheUFipl', 'd4th5ed66k'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, uqb8829qSQEKSUUyX8.csHigh entropy of concatenated method names: 'rtWrkCm7DB', 'lP6rQhnIAF', 'LbBrNnnEVw', 'EuYrIBOX1r', 'iRDr7jdZVC', 'mnXrpxDqFf', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, qFYK852BrT3Kkc2vmV.csHigh entropy of concatenated method names: 'ToString', 'zP04mHM7LT', 'Jtv4QDWxdF', 'yyK4NSxP4u', 'Lde4Ii4Bf0', 'TOr4pGF67I', 'RdY4xyfdl2', 'YiK4TMLoL9', 'Mbu4VmHe83', 'RHX4iL1328'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, jltxWJLFOkrowWdHRa.csHigh entropy of concatenated method names: 'seFLSBnOpc', 'QE9LZdSWex', 'bJoLvnWHk7', 'A0kLhD1IBT', 'P6PLaQOMmc', 'ENOL1Jh0eU', 'dtGLCl5PkZ', 'tDrLKnIP87', 'cCRLWJLpjg', 'ooxLBaYBH8'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, NrduLADURKlOmqWg36.csHigh entropy of concatenated method names: 'Dispose', 'dMltdwbRA3', 'SVqgQJoKWO', 'wTuJJWsrbE', 'j8qtMIh6J0', 'lT7tz3Jerk', 'ProcessDialogKey', 'Vn7gwqUXMi', 'jSZgtjOB2E', 'v1iggpDuKl'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, aglaL3SBeIfXbEHPr5.csHigh entropy of concatenated method names: 'yXyjD4ccT', 'rmIEgF0Lt', 'KvnlWhZ9v', 'MYg9jXo9Q', 'AoduPg6vq', 'aTJA2fql4', 'vfabRaTseTihmVIBbq', 'oqC9ECJ7jnFvOil5Y8', 'EcgowA4VcZUR6YVWVb', 'wJOr9GZBk'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, lsSq27I0hnIdfvPF4e.csHigh entropy of concatenated method names: 'GS4rZIyRch', 'krfrvMo2Vh', 'zcgrhuAU1d', 'E8gra6OC98', 'MHWr1Nt9K3', 'PFCrCv9ELL', 'TLTrKOkL8C', 'knJrWVXJvv', 'mQfrBBRdId', 'qYRr0dw2Jh'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, a6JHtZGdpnrIbdwyXv.csHigh entropy of concatenated method names: 'ViFet6IgGt', 'ExfeLAf10o', 'iqIeqd02sw', 'LwXeZDAcij', 'dBuevhFKOK', 'ufuea1s2Yn', 'bI0e1n1dkH', 'pCwrYGqcwX', 'eqTrffr0Jh', 'j6hrdy0lUf'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, IK1XrNJvr7PPm1j0MU.csHigh entropy of concatenated method names: 'LyUsfGYeW3', 'dXcsMSiTm6', 'Cb7rwVBCEb', 'G0drtoQdIw', 'woPsmJRtcK', 'J2WsXFjci4', 'kCasbnGPaV', 'Pbts7Fux4c', 'eM8scJxOuU', 'lgCsUgB5Gu'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, BdI41qFnRSKwjr8vRsn.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Svq57XkBVw', 'Gf35cnPVvI', 'YUK5UeVrNG', 'CW85o2AK86', 'l2l5GLIyyM', 'tG452jZ1sY', 'vsJ5YkQVty'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, Knh1rZctAHXyTagCjl.csHigh entropy of concatenated method names: 'pwJCDuvOXY', 'V7VC6ZraL8', 'VQUCj1a4HL', 'XqoCETSHf1', 'TbwCP3iO7c', 'oDTClQYMK3', 'aXoC9ZW6fT', 'UwvCnafP8F', 'UtwCuxdeZb', 'seFCAQpgIv'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, BQ07W6faPBvr0ngALj.csHigh entropy of concatenated method names: 'GPx1Su0hbi', 'epd1vD3fbv', 'Ii21aL7h0G', 'vb41C8yrg5', 'cSX1KHZ5iX', 'YEaaGuNu4N', 'fkja2cuZKI', 'tVlaYSwTkW', 'i1fafgFgFS', 'ylrad0irmy'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, hbZNRJKn3pZuk9vCcl.csHigh entropy of concatenated method names: 'x4uv79T57D', 'MmjvcWuxcC', 'O66vU2FRJw', 'RwNvoKedMK', 'N7gvGhACcU', 'P6Mv2oxrXw', 'DnwvYjkEQy', 'YmhvfXTs1J', 'khavdUYoEm', 'wgYvMadjZ6'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, WHHN6qPHh8Gp7ChIm9.csHigh entropy of concatenated method names: 'PqbCZSZJeO', 'R5YChTqG27', 'Y4EC1H5Xgc', 'gOl1MntkaJ', 'bcS1z063qy', 'yR5CwajvHY', 'x5PCtPNV8N', 'Lb1Cgs6wGv', 'PCFCLGPFeU', 'UUGCqhuF7N'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, M2rrVhU3FjFAhrKFRP.csHigh entropy of concatenated method names: 'C3lsBYVfUZ', 'z8Vs0eDmTu', 'ToString', 'TlgsZ5c0eg', 'L4fsvXrPp0', 'wtesh7u6Rr', 'lonsak2A59', 'Db5s1fhOLX', 'jsIsCLlpL3', 'RPXsKp3rU2'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, i0WP6bFCToAWJjStbBE.csHigh entropy of concatenated method names: 'soPeDdAJ4U', 'kBOe6TZYNG', 'vT8ejZRa3Z', 's85eEItWvs', 'Uv0ePtWMGe', 'Hryelhb4BA', 'Gdle9Y7x2A', 'i4nen1cjPy', 'zKTeucFwIc', 'A5veAJxbb3'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, YKiqK78yXUtNKTP13r.csHigh entropy of concatenated method names: 'lvBO8IFhoK', 'BrUOXeDSph', 'jPxO71OQkR', 'jkfOcHEbeR', 'dZcOQK3dAq', 'tFCONLucdK', 'v5LOIuyiMu', 'cTbOpYu4y7', 'j9qOx53wkT', 'rmaOT9VkhZ'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, acsoXDaJfaCEw9XyjA.csHigh entropy of concatenated method names: 'dq9aPXxkoT', 'SRoa99nncq', 'qv5hN84FxZ', 'oeUhIBg5eC', 'CwGhpyTf4t', 'EdshxdVGK9', 'W3phTnVqKg', 'a6IhVRkTcY', 'Q2QhiD5Zjt', 'rQgh8ns60g'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.88a0000.7.raw.unpack, p02NCl3dFf9aHThU9q.csHigh entropy of concatenated method names: 'Gbr3nuweOX', 'x2G3u5SUO5', 'cgd3kL46ly', 'lpZ3QJ00X1', 'Sxc3IZ8Vxe', 'gaH3pQi5bG', 'd6N3TSIogC', 'vgC3VyeswW', 'USG38SFwJW', 'pi23mpWesb'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, jwvBObYx4KVfbRPv8H.csHigh entropy of concatenated method names: 'dNitCBtyDX', 'LGxtKyc2Gf', 'DtStBGq7Dl', 'Kdrt0CgSW4', 'RxYtOuOUBA', 'aJNt4TKylH', 'ruLyIUVPrB4ueT7al4', 'TQppsVRICj7DY6vPLK', 'XNjtt2Uy2r', 'eU9tLcgiPM'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, O6JYRBbGpphBJ1wiTr.csHigh entropy of concatenated method names: 'aUYhEDxDLg', 'jkUhlEPtOR', 'KF3hnKYmbg', 'qlEhuWfPdf', 'gXEhOMMUeu', 'qGeh4gPbUF', 'RAAhsQnnWg', 'BbOhrhdd7v', 'TOJheUFipl', 'd4th5ed66k'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, uqb8829qSQEKSUUyX8.csHigh entropy of concatenated method names: 'rtWrkCm7DB', 'lP6rQhnIAF', 'LbBrNnnEVw', 'EuYrIBOX1r', 'iRDr7jdZVC', 'mnXrpxDqFf', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, qFYK852BrT3Kkc2vmV.csHigh entropy of concatenated method names: 'ToString', 'zP04mHM7LT', 'Jtv4QDWxdF', 'yyK4NSxP4u', 'Lde4Ii4Bf0', 'TOr4pGF67I', 'RdY4xyfdl2', 'YiK4TMLoL9', 'Mbu4VmHe83', 'RHX4iL1328'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, jltxWJLFOkrowWdHRa.csHigh entropy of concatenated method names: 'seFLSBnOpc', 'QE9LZdSWex', 'bJoLvnWHk7', 'A0kLhD1IBT', 'P6PLaQOMmc', 'ENOL1Jh0eU', 'dtGLCl5PkZ', 'tDrLKnIP87', 'cCRLWJLpjg', 'ooxLBaYBH8'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, NrduLADURKlOmqWg36.csHigh entropy of concatenated method names: 'Dispose', 'dMltdwbRA3', 'SVqgQJoKWO', 'wTuJJWsrbE', 'j8qtMIh6J0', 'lT7tz3Jerk', 'ProcessDialogKey', 'Vn7gwqUXMi', 'jSZgtjOB2E', 'v1iggpDuKl'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, aglaL3SBeIfXbEHPr5.csHigh entropy of concatenated method names: 'yXyjD4ccT', 'rmIEgF0Lt', 'KvnlWhZ9v', 'MYg9jXo9Q', 'AoduPg6vq', 'aTJA2fql4', 'vfabRaTseTihmVIBbq', 'oqC9ECJ7jnFvOil5Y8', 'EcgowA4VcZUR6YVWVb', 'wJOr9GZBk'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, lsSq27I0hnIdfvPF4e.csHigh entropy of concatenated method names: 'GS4rZIyRch', 'krfrvMo2Vh', 'zcgrhuAU1d', 'E8gra6OC98', 'MHWr1Nt9K3', 'PFCrCv9ELL', 'TLTrKOkL8C', 'knJrWVXJvv', 'mQfrBBRdId', 'qYRr0dw2Jh'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, a6JHtZGdpnrIbdwyXv.csHigh entropy of concatenated method names: 'ViFet6IgGt', 'ExfeLAf10o', 'iqIeqd02sw', 'LwXeZDAcij', 'dBuevhFKOK', 'ufuea1s2Yn', 'bI0e1n1dkH', 'pCwrYGqcwX', 'eqTrffr0Jh', 'j6hrdy0lUf'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, IK1XrNJvr7PPm1j0MU.csHigh entropy of concatenated method names: 'LyUsfGYeW3', 'dXcsMSiTm6', 'Cb7rwVBCEb', 'G0drtoQdIw', 'woPsmJRtcK', 'J2WsXFjci4', 'kCasbnGPaV', 'Pbts7Fux4c', 'eM8scJxOuU', 'lgCsUgB5Gu'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, BdI41qFnRSKwjr8vRsn.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Svq57XkBVw', 'Gf35cnPVvI', 'YUK5UeVrNG', 'CW85o2AK86', 'l2l5GLIyyM', 'tG452jZ1sY', 'vsJ5YkQVty'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, Knh1rZctAHXyTagCjl.csHigh entropy of concatenated method names: 'pwJCDuvOXY', 'V7VC6ZraL8', 'VQUCj1a4HL', 'XqoCETSHf1', 'TbwCP3iO7c', 'oDTClQYMK3', 'aXoC9ZW6fT', 'UwvCnafP8F', 'UtwCuxdeZb', 'seFCAQpgIv'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, BQ07W6faPBvr0ngALj.csHigh entropy of concatenated method names: 'GPx1Su0hbi', 'epd1vD3fbv', 'Ii21aL7h0G', 'vb41C8yrg5', 'cSX1KHZ5iX', 'YEaaGuNu4N', 'fkja2cuZKI', 'tVlaYSwTkW', 'i1fafgFgFS', 'ylrad0irmy'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, hbZNRJKn3pZuk9vCcl.csHigh entropy of concatenated method names: 'x4uv79T57D', 'MmjvcWuxcC', 'O66vU2FRJw', 'RwNvoKedMK', 'N7gvGhACcU', 'P6Mv2oxrXw', 'DnwvYjkEQy', 'YmhvfXTs1J', 'khavdUYoEm', 'wgYvMadjZ6'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, WHHN6qPHh8Gp7ChIm9.csHigh entropy of concatenated method names: 'PqbCZSZJeO', 'R5YChTqG27', 'Y4EC1H5Xgc', 'gOl1MntkaJ', 'bcS1z063qy', 'yR5CwajvHY', 'x5PCtPNV8N', 'Lb1Cgs6wGv', 'PCFCLGPFeU', 'UUGCqhuF7N'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, M2rrVhU3FjFAhrKFRP.csHigh entropy of concatenated method names: 'C3lsBYVfUZ', 'z8Vs0eDmTu', 'ToString', 'TlgsZ5c0eg', 'L4fsvXrPp0', 'wtesh7u6Rr', 'lonsak2A59', 'Db5s1fhOLX', 'jsIsCLlpL3', 'RPXsKp3rU2'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, i0WP6bFCToAWJjStbBE.csHigh entropy of concatenated method names: 'soPeDdAJ4U', 'kBOe6TZYNG', 'vT8ejZRa3Z', 's85eEItWvs', 'Uv0ePtWMGe', 'Hryelhb4BA', 'Gdle9Y7x2A', 'i4nen1cjPy', 'zKTeucFwIc', 'A5veAJxbb3'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, YKiqK78yXUtNKTP13r.csHigh entropy of concatenated method names: 'lvBO8IFhoK', 'BrUOXeDSph', 'jPxO71OQkR', 'jkfOcHEbeR', 'dZcOQK3dAq', 'tFCONLucdK', 'v5LOIuyiMu', 'cTbOpYu4y7', 'j9qOx53wkT', 'rmaOT9VkhZ'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, acsoXDaJfaCEw9XyjA.csHigh entropy of concatenated method names: 'dq9aPXxkoT', 'SRoa99nncq', 'qv5hN84FxZ', 'oeUhIBg5eC', 'CwGhpyTf4t', 'EdshxdVGK9', 'W3phTnVqKg', 'a6IhVRkTcY', 'Q2QhiD5Zjt', 'rQgh8ns60g'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, p02NCl3dFf9aHThU9q.csHigh entropy of concatenated method names: 'Gbr3nuweOX', 'x2G3u5SUO5', 'cgd3kL46ly', 'lpZ3QJ00X1', 'Sxc3IZ8Vxe', 'gaH3pQi5bG', 'd6N3TSIogC', 'vgC3VyeswW', 'USG38SFwJW', 'pi23mpWesb'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, jwvBObYx4KVfbRPv8H.csHigh entropy of concatenated method names: 'dNitCBtyDX', 'LGxtKyc2Gf', 'DtStBGq7Dl', 'Kdrt0CgSW4', 'RxYtOuOUBA', 'aJNt4TKylH', 'ruLyIUVPrB4ueT7al4', 'TQppsVRICj7DY6vPLK', 'XNjtt2Uy2r', 'eU9tLcgiPM'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, O6JYRBbGpphBJ1wiTr.csHigh entropy of concatenated method names: 'aUYhEDxDLg', 'jkUhlEPtOR', 'KF3hnKYmbg', 'qlEhuWfPdf', 'gXEhOMMUeu', 'qGeh4gPbUF', 'RAAhsQnnWg', 'BbOhrhdd7v', 'TOJheUFipl', 'd4th5ed66k'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, uqb8829qSQEKSUUyX8.csHigh entropy of concatenated method names: 'rtWrkCm7DB', 'lP6rQhnIAF', 'LbBrNnnEVw', 'EuYrIBOX1r', 'iRDr7jdZVC', 'mnXrpxDqFf', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, qFYK852BrT3Kkc2vmV.csHigh entropy of concatenated method names: 'ToString', 'zP04mHM7LT', 'Jtv4QDWxdF', 'yyK4NSxP4u', 'Lde4Ii4Bf0', 'TOr4pGF67I', 'RdY4xyfdl2', 'YiK4TMLoL9', 'Mbu4VmHe83', 'RHX4iL1328'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, jltxWJLFOkrowWdHRa.csHigh entropy of concatenated method names: 'seFLSBnOpc', 'QE9LZdSWex', 'bJoLvnWHk7', 'A0kLhD1IBT', 'P6PLaQOMmc', 'ENOL1Jh0eU', 'dtGLCl5PkZ', 'tDrLKnIP87', 'cCRLWJLpjg', 'ooxLBaYBH8'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, NrduLADURKlOmqWg36.csHigh entropy of concatenated method names: 'Dispose', 'dMltdwbRA3', 'SVqgQJoKWO', 'wTuJJWsrbE', 'j8qtMIh6J0', 'lT7tz3Jerk', 'ProcessDialogKey', 'Vn7gwqUXMi', 'jSZgtjOB2E', 'v1iggpDuKl'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, aglaL3SBeIfXbEHPr5.csHigh entropy of concatenated method names: 'yXyjD4ccT', 'rmIEgF0Lt', 'KvnlWhZ9v', 'MYg9jXo9Q', 'AoduPg6vq', 'aTJA2fql4', 'vfabRaTseTihmVIBbq', 'oqC9ECJ7jnFvOil5Y8', 'EcgowA4VcZUR6YVWVb', 'wJOr9GZBk'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, lsSq27I0hnIdfvPF4e.csHigh entropy of concatenated method names: 'GS4rZIyRch', 'krfrvMo2Vh', 'zcgrhuAU1d', 'E8gra6OC98', 'MHWr1Nt9K3', 'PFCrCv9ELL', 'TLTrKOkL8C', 'knJrWVXJvv', 'mQfrBBRdId', 'qYRr0dw2Jh'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, a6JHtZGdpnrIbdwyXv.csHigh entropy of concatenated method names: 'ViFet6IgGt', 'ExfeLAf10o', 'iqIeqd02sw', 'LwXeZDAcij', 'dBuevhFKOK', 'ufuea1s2Yn', 'bI0e1n1dkH', 'pCwrYGqcwX', 'eqTrffr0Jh', 'j6hrdy0lUf'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, IK1XrNJvr7PPm1j0MU.csHigh entropy of concatenated method names: 'LyUsfGYeW3', 'dXcsMSiTm6', 'Cb7rwVBCEb', 'G0drtoQdIw', 'woPsmJRtcK', 'J2WsXFjci4', 'kCasbnGPaV', 'Pbts7Fux4c', 'eM8scJxOuU', 'lgCsUgB5Gu'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, BdI41qFnRSKwjr8vRsn.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Svq57XkBVw', 'Gf35cnPVvI', 'YUK5UeVrNG', 'CW85o2AK86', 'l2l5GLIyyM', 'tG452jZ1sY', 'vsJ5YkQVty'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, Knh1rZctAHXyTagCjl.csHigh entropy of concatenated method names: 'pwJCDuvOXY', 'V7VC6ZraL8', 'VQUCj1a4HL', 'XqoCETSHf1', 'TbwCP3iO7c', 'oDTClQYMK3', 'aXoC9ZW6fT', 'UwvCnafP8F', 'UtwCuxdeZb', 'seFCAQpgIv'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, BQ07W6faPBvr0ngALj.csHigh entropy of concatenated method names: 'GPx1Su0hbi', 'epd1vD3fbv', 'Ii21aL7h0G', 'vb41C8yrg5', 'cSX1KHZ5iX', 'YEaaGuNu4N', 'fkja2cuZKI', 'tVlaYSwTkW', 'i1fafgFgFS', 'ylrad0irmy'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, hbZNRJKn3pZuk9vCcl.csHigh entropy of concatenated method names: 'x4uv79T57D', 'MmjvcWuxcC', 'O66vU2FRJw', 'RwNvoKedMK', 'N7gvGhACcU', 'P6Mv2oxrXw', 'DnwvYjkEQy', 'YmhvfXTs1J', 'khavdUYoEm', 'wgYvMadjZ6'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, WHHN6qPHh8Gp7ChIm9.csHigh entropy of concatenated method names: 'PqbCZSZJeO', 'R5YChTqG27', 'Y4EC1H5Xgc', 'gOl1MntkaJ', 'bcS1z063qy', 'yR5CwajvHY', 'x5PCtPNV8N', 'Lb1Cgs6wGv', 'PCFCLGPFeU', 'UUGCqhuF7N'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, M2rrVhU3FjFAhrKFRP.csHigh entropy of concatenated method names: 'C3lsBYVfUZ', 'z8Vs0eDmTu', 'ToString', 'TlgsZ5c0eg', 'L4fsvXrPp0', 'wtesh7u6Rr', 'lonsak2A59', 'Db5s1fhOLX', 'jsIsCLlpL3', 'RPXsKp3rU2'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, i0WP6bFCToAWJjStbBE.csHigh entropy of concatenated method names: 'soPeDdAJ4U', 'kBOe6TZYNG', 'vT8ejZRa3Z', 's85eEItWvs', 'Uv0ePtWMGe', 'Hryelhb4BA', 'Gdle9Y7x2A', 'i4nen1cjPy', 'zKTeucFwIc', 'A5veAJxbb3'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, YKiqK78yXUtNKTP13r.csHigh entropy of concatenated method names: 'lvBO8IFhoK', 'BrUOXeDSph', 'jPxO71OQkR', 'jkfOcHEbeR', 'dZcOQK3dAq', 'tFCONLucdK', 'v5LOIuyiMu', 'cTbOpYu4y7', 'j9qOx53wkT', 'rmaOT9VkhZ'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, acsoXDaJfaCEw9XyjA.csHigh entropy of concatenated method names: 'dq9aPXxkoT', 'SRoa99nncq', 'qv5hN84FxZ', 'oeUhIBg5eC', 'CwGhpyTf4t', 'EdshxdVGK9', 'W3phTnVqKg', 'a6IhVRkTcY', 'Q2QhiD5Zjt', 'rQgh8ns60g'
                    Source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, p02NCl3dFf9aHThU9q.csHigh entropy of concatenated method names: 'Gbr3nuweOX', 'x2G3u5SUO5', 'cgd3kL46ly', 'lpZ3QJ00X1', 'Sxc3IZ8Vxe', 'gaH3pQi5bG', 'd6N3TSIogC', 'vgC3VyeswW', 'USG38SFwJW', 'pi23mpWesb'
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeJump to dropped file
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run BjTxJteJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run BjTxJteJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile opened: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeFile opened: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe:Zone.Identifier read attributes | delete
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: Possible double extension: pdf.exeStatic PE information: BKG#SGN2106728.PDF.exe
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 7788, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 8172, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 10E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 1270000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 6230000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 7230000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 7370000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 8370000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 8950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 9950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: A950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: B950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 14A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 3040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: 5040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 1040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 5CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 6CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 6E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 7E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 5CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 1780000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 33E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory allocated: 3200000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: D90000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 2770000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 4870000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 5F40000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 6F40000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 7090000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 8090000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 8900000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 5F40000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 1460000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 2F10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 4F10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 2EA0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 30E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 2EA0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 6710000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 7710000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 7850000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 8850000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 8E10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 9E10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: AE10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: BE10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 15E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 3170000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory allocated: 1660000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1200000Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199875Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199766Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199656Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199547Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199437Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199328Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199219Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199109Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1200000
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199871
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199765
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199656
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199546
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199437
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199328
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199218
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199109
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198999
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198890
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198781
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198572
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198406
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198281
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198165
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197926
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197807
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197687
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197578
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197468
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197359
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197249
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199936
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199828
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199719
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199589
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199484
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199375
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199240
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199938
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199825
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199719
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199594
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196360
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7408Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6839Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWindow / User API: threadDelayed 3068Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWindow / User API: threadDelayed 6736Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWindow / User API: threadDelayed 4686
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWindow / User API: threadDelayed 5148
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindow / User API: threadDelayed 3754
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindow / User API: threadDelayed 6097
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindow / User API: threadDelayed 4139
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWindow / User API: threadDelayed 5660
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 6804Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6504Thread sleep count: 7408 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7200Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7048Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7240Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5660Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99873s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99764s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99646s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99515s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99406s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99297s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99187s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -99078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98968s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98625s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98515s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98406s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98297s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98187s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -98078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97968s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -97091s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96655s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -96109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -95995s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -95875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -95762s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -95656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1200000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe TID: 7376Thread sleep time: -1199000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7300Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -35971150943733603s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -99000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98453s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98225s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -98000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -97881s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -97750s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -97610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -97487s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -97359s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -97035s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -96906s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -96654s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1200000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199871s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1199109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198999s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198572s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198406s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1198165s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197926s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197807s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197687s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197468s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197359s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe TID: 7632Thread sleep time: -1197249s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 7812Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep count: 39 > 30
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -35971150943733603s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99843s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8160Thread sleep count: 3754 > 30
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99734s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8160Thread sleep count: 6097 > 30
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99625s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99515s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99406s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99291s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99187s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -99078s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98968s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98859s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98750s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98640s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98531s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98422s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98312s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98203s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -98093s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97984s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -97000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -96890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -96781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -96672s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -96561s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -96442s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -96281s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199936s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199719s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199589s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199484s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199375s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199240s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1199110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 8156Thread sleep time: -1198110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 7032Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep count: 36 > 30
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -33204139332677172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 1068Thread sleep count: 4139 > 30
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99875s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 1068Thread sleep count: 5660 > 30
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99766s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99547s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99424s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99297s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99187s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -99050s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -98891s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -98759s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -98625s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -98345s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -98219s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -98103s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -97741s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -97637s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -96986s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -96840s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -96728s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -96411s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -96030s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -95922s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -95813s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199938s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199825s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199719s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199594s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1199110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1198110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1197110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1196985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1196860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1196735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1196610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1196485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe TID: 4996Thread sleep time: -1196360s >= -30000s
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99873Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99764Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99646Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99515Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99406Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99297Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99187Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 99078Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98968Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98859Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98750Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98625Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98515Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98406Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98297Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98187Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 98078Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97968Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97859Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97750Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97640Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97531Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97421Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97312Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97203Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 97091Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96984Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96875Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96765Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96655Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96547Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96437Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96328Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96218Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 96109Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 95995Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 95875Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 95762Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 95656Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1200000Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199875Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199766Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199656Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199547Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199437Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199328Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199219Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199109Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeThread delayed: delay time: 1199000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99875
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99765
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99546
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99437
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99328
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99218
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99109
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 99000
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98890
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98781
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98672
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98562
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98453
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98343
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98225
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98109
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 98000
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 97881
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 97750
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 97610
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 97487
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 97359
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 97035
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 96906
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 96654
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1200000
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199871
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199765
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199656
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199546
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199437
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199328
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199218
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1199109
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198999
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198890
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198781
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198572
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198406
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198281
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1198165
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197926
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197807
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197687
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197578
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197468
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197359
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeThread delayed: delay time: 1197249
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99843
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99734
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99625
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99515
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99406
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99291
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99187
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99078
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98968
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98859
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98750
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98640
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98531
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98422
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98312
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98203
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98093
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97984
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97875
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97765
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97656
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97547
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97437
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97328
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97218
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97109
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97000
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96890
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96781
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96672
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96561
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96442
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96281
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199936
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199828
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199719
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199589
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199484
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199375
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199240
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99875
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99766
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99547
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99424
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99297
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99187
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 99050
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98891
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98759
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98625
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98345
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98219
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 98103
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97741
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 97637
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96986
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96840
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96728
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96411
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 96030
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 95922
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 95813
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199938
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199825
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199719
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199594
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1199110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1198110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197360
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197235
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1197110
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196985
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196860
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196735
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196610
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196485
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeThread delayed: delay time: 1196360
                    Source: BjTxJte.exe, 00000019.00000002.2001406435.0000000001381000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\~U
                    Source: eDnxmGWzJ.exe, 0000000A.00000002.1807266227.0000000000A42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}`
                    Source: eDnxmGWzJ.exe, 0000000F.00000002.2927536460.00000000015A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
                    Source: BjTxJte.exe, 00000011.00000002.1919920191.0000000000AD2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeMemory written: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeMemory written: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory written: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeMemory written: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeProcess created: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeProcess created: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp"
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeProcess created: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe "C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                    Source: eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003493000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq3<b>[ Program Manager]</b> (18/04/2024 15:48:28)<br>
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030CF000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003493000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003493000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRkqtuI
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq3<b>[ Program Manager]</b> (19/04/2024 06:06:28)<br>
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Time: 05/16/2024 18:56:06<br>User Name: user<br>Computer Name: 609290<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 81.181.57.52<br><hr><b>[ Program Manager]</b> (19/04/2024 06:06:28)<br>{Win}r
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq8<b>[ Program Manager]</b> (19/04/2024 06:06:28)<br>{Win}THpq
                    Source: eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003493000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq8<b>[ Program Manager]</b> (18/04/2024 15:48:28)<br>{Win}THpqLjI
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRkqD
                    Source: BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq9<b>[ Program Manager]</b> (19/04/2024 06:06:28)<br>{Win}rTHpq
                    Source: eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Time: 05/18/2024 13:58:21<br>User Name: user<br>Computer Name: 609290<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 81.181.57.52<br><hr><b>[ Program Manager]</b> (18/04/2024 15:48:28)<br>{Win}r
                    Source: eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003493000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq9<b>[ Program Manager]</b> (18/04/2024 15:48:28)<br>{Win}rTHpqLjI
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.eDnxmGWzJ.exe.399fde0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.eDnxmGWzJ.exe.399fde0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7524, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 7996, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 6180, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\BKG#SGN2106728.PDF.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.eDnxmGWzJ.exe.399fde0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.eDnxmGWzJ.exe.399fde0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7524, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 7996, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 6180, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.eDnxmGWzJ.exe.399fde0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.3cb4bc0.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4acc780.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4a26560.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.eDnxmGWzJ.exe.399fde0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BKG#SGN2106728.PDF.exe.4980340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.2932875412.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.1983604428.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 6768, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BKG#SGN2106728.PDF.exe PID: 332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: eDnxmGWzJ.exe PID: 7524, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 7996, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BjTxJte.exe PID: 6180, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    112
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Registry Run Keys / Startup Folder
                    1
                    Scheduled Task/Job
                    12
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                    Registry Run Keys / Startup Folder
                    12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model211
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets2
                    Process Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427946 Sample: BKG#SGN2106728.PDF.exe Startdate: 18/04/2024 Architecture: WINDOWS Score: 100 61 mail.flexwelltour.com 2->61 63 flexwelltour.com 2->63 65 api.ipify.org 2->65 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Antivirus / Scanner detection for submitted sample 2->75 77 13 other signatures 2->77 8 BKG#SGN2106728.PDF.exe 7 2->8         started        12 eDnxmGWzJ.exe 5 2->12         started        14 BjTxJte.exe 2->14         started        16 BjTxJte.exe 2->16         started        signatures3 process4 file5 57 C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe, PE32 8->57 dropped 59 C:\Users\user\AppData\Local\...\tmp5779.tmp, XML 8->59 dropped 93 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->93 95 Uses schtasks.exe or at.exe to add and modify task schedules 8->95 97 Adds a directory exclusion to Windows Defender 8->97 18 BKG#SGN2106728.PDF.exe 16 5 8->18         started        23 powershell.exe 23 8->23         started        33 4 other processes 8->33 99 Antivirus detection for dropped file 12->99 101 Multi AV Scanner detection for dropped file 12->101 103 Machine Learning detection for dropped file 12->103 25 eDnxmGWzJ.exe 12->25         started        35 2 other processes 12->35 105 Injects a PE file into a foreign processes 14->105 27 BjTxJte.exe 14->27         started        37 3 other processes 14->37 29 BjTxJte.exe 16->29         started        31 schtasks.exe 16->31         started        signatures6 process7 dnsIp8 67 api.ipify.org 172.67.74.152, 443, 49730, 49732 CLOUDFLARENETUS United States 18->67 69 flexwelltour.com 94.199.200.238, 49731, 49733, 49740 AEROTEK-ASTR Turkey 18->69 53 C:\Users\user\AppData\Roaming\...\BjTxJte.exe, PE32 18->53 dropped 55 C:\Users\user\...\BjTxJte.exe:Zone.Identifier, ASCII 18->55 dropped 79 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->79 81 Tries to steal Mail credentials (via file / registry access) 18->81 83 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->83 85 Loading BitLocker PowerShell Module 23->85 39 conhost.exe 23->39         started        41 WmiPrvSE.exe 23->41         started        87 Tries to harvest and steal ftp login credentials 29->87 89 Tries to harvest and steal browser information (history, passwords, etc) 29->89 91 Installs a global keyboard hook 29->91 43 conhost.exe 31->43         started        45 conhost.exe 33->45         started        47 conhost.exe 33->47         started        49 conhost.exe 35->49         started        51 conhost.exe 37->51         started        file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    BKG#SGN2106728.PDF.exe44%VirustotalBrowse
                    BKG#SGN2106728.PDF.exe45%ReversingLabsWin32.Trojan.Vigorf
                    BKG#SGN2106728.PDF.exe100%AviraHEUR/AGEN.1323731
                    BKG#SGN2106728.PDF.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe100%AviraHEUR/AGEN.1323731
                    C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe100%AviraHEUR/AGEN.1323731
                    C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe45%ReversingLabsWin32.Trojan.Vigorf
                    C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe44%VirustotalBrowse
                    C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe45%ReversingLabsWin32.Trojan.Vigorf
                    C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe44%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    flexwelltour.com0%VirustotalBrowse
                    mail.flexwelltour.com0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://r3.o.lencr.org00%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://flexwelltour.com0%VirustotalBrowse
                    http://mail.flexwelltour.com0%VirustotalBrowse
                    http://r3.i.lencr.org/0L0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    flexwelltour.com
                    94.199.200.238
                    truefalseunknown
                    api.ipify.org
                    172.67.74.152
                    truefalse
                      high
                      mail.flexwelltour.com
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://r3.o.lencr.org0BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2962504711.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.orgBKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://flexwelltour.comBKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000031DB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034EB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034A7000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          http://r3.i.lencr.org/0LBKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2962504711.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                          https://account.dyn.com/BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org/tBKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://mail.flexwelltour.comBKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000031DB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034EB000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000034A7000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBKG#SGN2106728.PDF.exe, 00000000.00000002.1747954818.0000000002C3B000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.0000000003041000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000A.00000002.1809479007.00000000028D2000.00000004.00000800.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000011.00000002.1921505605.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000019.00000002.2003324584.000000000312B000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.000000000317C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://x1.c.lencr.org/0BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2985822507.0000000007F90000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.00000000015A1000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001380000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001367000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://x1.i.lencr.org/0BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2932875412.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2985822507.0000000007F90000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.000000000153F000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2963874949.0000000006AE7000.00000004.00000020.00020000.00000000.sdmp, BKG#SGN2106728.PDF.exe, 00000009.00000002.2928753620.00000000014B0000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.0000000001577000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2927536460.00000000015A1000.00000004.00000020.00020000.00000000.sdmp, eDnxmGWzJ.exe, 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1980182823.00000000010EF000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1993408123.0000000006622000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001380000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001392000.00000004.00000020.00020000.00000000.sdmp, BjTxJte.exe, 0000001C.00000002.2927542147.0000000001367000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://x1.i.lenBjTxJte.exe, 0000001C.00000002.2962504711.00000000069DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  94.199.200.238
                                  flexwelltour.comTurkey
                                  42807AEROTEK-ASTRfalse
                                  172.67.74.152
                                  api.ipify.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1427946
                                  Start date and time:2024-04-18 11:23:08 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 10m 28s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:30
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:BKG#SGN2106728.PDF.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@41/20@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 488
                                  • Number of non-executed functions: 29
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  10:24:05Task SchedulerRun new task: eDnxmGWzJ path: C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                  10:24:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run BjTxJte C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                  10:24:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run BjTxJte C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                  11:24:01API Interceptor1899383x Sleep call for process: BKG#SGN2106728.PDF.exe modified
                                  11:24:04API Interceptor33x Sleep call for process: powershell.exe modified
                                  11:24:07API Interceptor698512x Sleep call for process: eDnxmGWzJ.exe modified
                                  11:24:19API Interceptor492166x Sleep call for process: BjTxJte.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  94.199.200.238Purchase Order PDF.exeGet hashmaliciousAgentTeslaBrowse
                                    P..O PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      UPDATED SOA PDF.exeGet hashmaliciousAgentTeslaBrowse
                                        172.67.74.152Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta.exeGet hashmaliciousStealitBrowse
                                        • api.ipify.org/?format=json
                                        SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/?format=json
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        api.ipify.orgproduct11221.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        DHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 104.26.13.205
                                        Outstanding Payment Invoice PO 3400375980.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 104.26.13.205
                                        Arrival Notice PUS_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 104.26.13.205
                                        Purchase Order PDF.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.13.205
                                        Leoch-Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        p silp AI240190.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        SecuriteInfo.com.Win32.PWSX-gen.1728.1300.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        SecuriteInfo.com.Heur.15333.25205.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        Leoch-Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        AEROTEK-ASTRPurchase Order PDF.exeGet hashmaliciousAgentTeslaBrowse
                                        • 94.199.200.238
                                        P..O PDF.exeGet hashmaliciousAgentTeslaBrowse
                                        • 94.199.200.238
                                        UPDATED SOA PDF.exeGet hashmaliciousAgentTeslaBrowse
                                        • 94.199.200.238
                                        OSET BESAFETY Mekatronik _ Siparis 0058114343.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                        • 94.199.206.42
                                        Fiyat BKBambalaj 03.04.2024 - TR-24-0286_ unit Siparis.exeGet hashmaliciousAgentTeslaBrowse
                                        • 37.230.104.41
                                        fiyat 01.04.2024 - AT-24-0186_ unit order .exeGet hashmaliciousAgentTeslaBrowse
                                        • 37.230.104.41
                                        Urunlar fiyat 25.03.2024 ara alim_ unit order.exeGet hashmaliciousAgentTeslaBrowse
                                        • 37.230.104.41
                                        fiyat 25.03.2024 ara alim_ unit order.exeGet hashmaliciousAgentTeslaBrowse
                                        • 37.230.104.41
                                        x8bQ5T4284.elfGet hashmaliciousUnknownBrowse
                                        • 152.89.38.40
                                        fiyat teklif_turanlargroupNM24A-SiparisT24A9030124.exeGet hashmaliciousAgentTeslaBrowse
                                        • 109.232.216.182
                                        CLOUDFLARENETUSproduct11221.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        http://streaming.jsonmediapacks.comGet hashmaliciousUnknownBrowse
                                        • 1.1.1.1
                                        https://www.hegemann-reiners.de/Get hashmaliciousUnknownBrowse
                                        • 172.67.157.200
                                        http://gamma.app/docs/Adobe-1098-uanmwmhgl6i90tc?mode=docGet hashmaliciousUnknownBrowse
                                        • 104.18.11.200
                                        DHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 104.26.13.205
                                        Outstanding Payment Invoice PO 3400375980.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 104.26.13.205
                                        Arrival Notice PUS_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 104.26.13.205
                                        5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                        • 104.21.84.67
                                        NEW ORDER.docGet hashmaliciousHTMLPhisherBrowse
                                        • 104.21.25.202
                                        file.exeGet hashmaliciousRisePro StealerBrowse
                                        • 104.26.4.15
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eproduct11221.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        product1122.htmlGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        DHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 172.67.74.152
                                        FACTURA24021151 - BP.vbsGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        Outstanding Payment Invoice PO 3400375980.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 172.67.74.152
                                        Arrival Notice PUS_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        • 172.67.74.152
                                        Transferencias SEPA.vbsGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        shipping doc.vbsGet hashmaliciousGuLoaderBrowse
                                        • 172.67.74.152
                                        FACTURA 130424435.vbsGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        justificant de transfer#U00e8ncia.vbsGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        No context
                                        Process:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2232
                                        Entropy (8bit):5.379401388151058
                                        Encrypted:false
                                        SSDEEP:48:fWSU4y4RY5mFoUeW+gZ9tK8NPZHUxL7u1iMuge//8PUyus:fLHyIYgKLgZ2KRHWLOug8s
                                        MD5:914CF3F4E3B8A3E129E2699C0C44BC7A
                                        SHA1:2BE8F29B8058D6C7BC16D0D13C49BDE1385EBD6D
                                        SHA-256:639686067F67F6DC6E58B9086A00B442632A8E2E06163E1644EC2FD36C71474A
                                        SHA-512:4F4B5CD075D1051A3F85895B9834FF970E040A927285AA5C85D85CAC29B3B97F80F2A4DBC7F64D0A575F5C08243198E7F615DE3787E4E12AD85C7CD30AD4B885
                                        Malicious:false
                                        Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<...............i..VdqF...|...........System.Configuration<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1575
                                        Entropy (8bit):5.11341022652264
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTqv
                                        MD5:D874639CB6C7E85DD03C44AAB8E85F11
                                        SHA1:34AAA5646A759918D128EDABDEFCD2324D3CAC5F
                                        SHA-256:D6D3A679D6900698354DCB1ED52613E27AAEF6023D182948E5874510AE566FE8
                                        SHA-512:3DA8235E3EFD5692F13256D8B3D877AD8925E5BE7B44D0A8E34070868D72678AC07CC841934B17225AE03C6CFDC56BC2F53F2844E715B30DAF96A64DCF0B1B3A
                                        Malicious:true
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1575
                                        Entropy (8bit):5.11341022652264
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTqv
                                        MD5:D874639CB6C7E85DD03C44AAB8E85F11
                                        SHA1:34AAA5646A759918D128EDABDEFCD2324D3CAC5F
                                        SHA-256:D6D3A679D6900698354DCB1ED52613E27AAEF6023D182948E5874510AE566FE8
                                        SHA-512:3DA8235E3EFD5692F13256D8B3D877AD8925E5BE7B44D0A8E34070868D72678AC07CC841934B17225AE03C6CFDC56BC2F53F2844E715B30DAF96A64DCF0B1B3A
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1575
                                        Entropy (8bit):5.11341022652264
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTqv
                                        MD5:D874639CB6C7E85DD03C44AAB8E85F11
                                        SHA1:34AAA5646A759918D128EDABDEFCD2324D3CAC5F
                                        SHA-256:D6D3A679D6900698354DCB1ED52613E27AAEF6023D182948E5874510AE566FE8
                                        SHA-512:3DA8235E3EFD5692F13256D8B3D877AD8925E5BE7B44D0A8E34070868D72678AC07CC841934B17225AE03C6CFDC56BC2F53F2844E715B30DAF96A64DCF0B1B3A
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        File Type:XML 1.0 document, ASCII text
                                        Category:dropped
                                        Size (bytes):1575
                                        Entropy (8bit):5.11341022652264
                                        Encrypted:false
                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtanxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTqv
                                        MD5:D874639CB6C7E85DD03C44AAB8E85F11
                                        SHA1:34AAA5646A759918D128EDABDEFCD2324D3CAC5F
                                        SHA-256:D6D3A679D6900698354DCB1ED52613E27AAEF6023D182948E5874510AE566FE8
                                        SHA-512:3DA8235E3EFD5692F13256D8B3D877AD8925E5BE7B44D0A8E34070868D72678AC07CC841934B17225AE03C6CFDC56BC2F53F2844E715B30DAF96A64DCF0B1B3A
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                        Process:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):901632
                                        Entropy (8bit):7.95829712238213
                                        Encrypted:false
                                        SSDEEP:12288:6FCnt27FjOqHjvCcDRLM4o4K6GCj4jo5TIOTOJLUn6nwj7po+Cycrf5ehpph1yB:Zo7FjOy3D93ovokqOJLU6nwjRCspH1k
                                        MD5:CCDB29C0D8E287CAD8644E0ADFD56178
                                        SHA1:3B5534A7AF776EC14A07DBE81CDE5BDBB538DCE8
                                        SHA-256:CB06339A87BDD6284086A97545C32DC8A3EB3701C7642543E7C327D0539005F9
                                        SHA-512:6E0CC7CEBD79142FA190D148C6030F2935D77F35DAAEB10B3F75C27C90DA27AA2908C3F17ADA436B49D6EF16273217B3FD47E4AD83441A4215E05EC98F1E2757
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 45%
                                        • Antivirus: Virustotal, Detection: 44%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... f............................v.... ........@.. ....................... ............@.....................................W.................................................................................... ............... ..H............text...|.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................X.......H.......<~...X......K...................................................z.(......}.....(....o ...}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....o`...:q....(....+..(........}.........(......*................n..}.....{....,..{....oX...*..{....*.s!.
                                        Process:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        Process:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):901632
                                        Entropy (8bit):7.95829712238213
                                        Encrypted:false
                                        SSDEEP:12288:6FCnt27FjOqHjvCcDRLM4o4K6GCj4jo5TIOTOJLUn6nwj7po+Cycrf5ehpph1yB:Zo7FjOy3D93ovokqOJLU6nwjRCspH1k
                                        MD5:CCDB29C0D8E287CAD8644E0ADFD56178
                                        SHA1:3B5534A7AF776EC14A07DBE81CDE5BDBB538DCE8
                                        SHA-256:CB06339A87BDD6284086A97545C32DC8A3EB3701C7642543E7C327D0539005F9
                                        SHA-512:6E0CC7CEBD79142FA190D148C6030F2935D77F35DAAEB10B3F75C27C90DA27AA2908C3F17ADA436B49D6EF16273217B3FD47E4AD83441A4215E05EC98F1E2757
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 45%
                                        • Antivirus: Virustotal, Detection: 44%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... f............................v.... ........@.. ....................... ............@.....................................W.................................................................................... ............... ..H............text...|.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................X.......H.......<~...X......K...................................................z.(......}.....(....o ...}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....o`...:q....(....+..(........}.........(......*................n..}.....{....,..{....oX...*..{....*.s!.
                                        Process:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:false
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.95829712238213
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:BKG#SGN2106728.PDF.exe
                                        File size:901'632 bytes
                                        MD5:ccdb29c0d8e287cad8644e0adfd56178
                                        SHA1:3b5534a7af776ec14a07dbe81cde5bdbb538dce8
                                        SHA256:cb06339a87bdd6284086a97545c32dc8a3eb3701c7642543e7c327d0539005f9
                                        SHA512:6e0cc7cebd79142fa190d148c6030f2935d77f35daaeb10b3f75c27c90da27aa2908c3f17ada436b49d6ef16273217b3fd47e4ad83441a4215e05ec98f1e2757
                                        SSDEEP:12288:6FCnt27FjOqHjvCcDRLM4o4K6GCj4jo5TIOTOJLUn6nwj7po+Cycrf5ehpph1yB:Zo7FjOy3D93ovokqOJLU6nwjRCspH1k
                                        TLSH:EB151357722D0B03CAFA1AF5450762292BF40259B5E7F3C98DD209E531EAFD49ACAC43
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... f............................v.... ........@.. ....................... ............@................................
                                        Icon Hash:90cececece8e8eb0
                                        Entrypoint:0x4dd776
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x6620C288 [Thu Apr 18 06:49:44 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xdd71c0x57.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x5e8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xe00000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xdb77c0xdb8004dfb64cc7cb8cf9bc24534b4c346ed00False0.9590433246725513data7.962537044370944IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xde0000x5e80x600aca1b73ca892d6cf9c1b10d31a84bc37False0.4427083333333333data4.236389012456819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xe00000xc0x200cc955ecb5af03f4c6658d8379999c43fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0xde0a00x394OpenPGP Secret Key0.42139737991266374
                                        RT_MANIFEST0xde4340x1b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (433), with no line terminators0.5642201834862385
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 18, 2024 11:24:06.350627899 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.350666046 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.350730896 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.364840984 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.364875078 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.591444016 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.591548920 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.594926119 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.594954014 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.595361948 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.635801077 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.710103989 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.752119064 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.885509014 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.885574102 CEST44349730172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:06.885679960 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:06.891366005 CEST49730443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:08.158734083 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:08.405529976 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:08.405867100 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:08.780041933 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:08.780292988 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:09.027519941 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:09.027913094 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:09.276181936 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:09.276770115 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:09.531550884 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:09.531619072 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:09.531663895 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:09.531750917 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:09.558322906 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:09.805227995 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:09.809037924 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:10.055780888 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:10.057199955 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:10.304379940 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:10.304745913 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:10.590322971 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:10.596420050 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:10.596702099 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:10.843595982 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:10.843658924 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:10.843985081 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:11.131622076 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:11.136096001 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:11.136425972 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:11.383279085 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:11.383339882 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:11.386192083 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:11.386265993 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:11.386320114 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:11.386400938 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:11.632781029 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:11.632831097 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:11.632864952 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:12.040632963 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:12.088903904 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:12.224796057 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.224896908 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.224991083 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.229022980 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.229060888 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.444650888 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.444736958 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.446794987 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.446810007 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.447060108 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.495138884 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.503273010 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.544190884 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.746954918 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.747041941 CEST44349732172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:12.747095108 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:12.751605988 CEST49732443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:13.555670977 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:13.799115896 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:13.799197912 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:14.047209978 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:14.047477961 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:14.290776014 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:14.290951967 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:14.535862923 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:14.536370039 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:14.787254095 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:14.787312984 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:14.787353992 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:14.787390947 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:14.788763046 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:15.032650948 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:15.041126966 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:15.284605980 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:15.286902905 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:15.530497074 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:15.530848980 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:15.779095888 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:15.781728983 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.025099993 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:16.026098967 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.308960915 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:16.320794106 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:16.370138884 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.505496025 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.749063969 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:16.749124050 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:16.751240969 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.760036945 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.760054111 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.760149956 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:16.994604111 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:17.003734112 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:17.003751993 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:17.003768921 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:17.450637102 CEST5874973394.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:17.495151997 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:23.313112974 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.313152075 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.313226938 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.316452980 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.316466093 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.532391071 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.532464981 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.533895016 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.533904076 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.534224033 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.585700035 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.628110886 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.838673115 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.838825941 CEST44349739172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:23.839109898 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:23.842123985 CEST49739443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:24.306951046 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:24.552021980 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:24.552114010 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:24.800533056 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:24.800734997 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:25.046039104 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:25.046221972 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:25.292879105 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:25.293607950 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:25.546672106 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:25.546717882 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:25.546757936 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:25.546786070 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:25.548736095 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:25.794019938 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:25.799376965 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:26.044503927 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:26.044891119 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:26.290486097 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:26.290802956 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:26.540549040 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:26.540873051 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:26.786166906 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:26.786472082 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:27.071331978 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.074132919 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.074358940 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:27.319271088 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.319334984 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.319996119 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:27.320056915 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:27.320080042 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:27.320113897 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:27.564977884 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.565032005 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.565071106 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:27.565104961 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:28.007097006 CEST5874974094.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:28.057672977 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:31.382195950 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.382287025 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.382359028 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.387006044 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.387043953 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.610465050 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.610548019 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.616195917 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.616205931 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.616597891 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.667020082 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.683917999 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.728123903 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.917975903 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.918047905 CEST44349741172.67.74.152192.168.2.4
                                        Apr 18, 2024 11:24:31.918127060 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:31.921277046 CEST49741443192.168.2.4172.67.74.152
                                        Apr 18, 2024 11:24:32.527776003 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:32.650538921 CEST49740587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:32.774422884 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:32.774640083 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:33.025479078 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:33.025702000 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:33.272602081 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:33.272810936 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:33.520772934 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:33.522929907 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:33.777229071 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:33.777297020 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:33.777337074 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:33.777393103 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:33.780231953 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:34.027087927 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:34.073316097 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:34.163846016 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:34.410429001 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:34.410743952 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:34.657851934 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:34.663624048 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:34.914343119 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:34.914669991 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:35.161266088 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:35.276562929 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:35.514558077 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:35.800865889 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:35.802018881 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:35.802212954 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:36.049395084 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.049559116 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.056421995 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:36.056421995 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:36.056421995 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:36.056421995 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:24:36.303311110 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.303334951 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.303349972 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.303365946 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.716850042 CEST5874974294.199.200.238192.168.2.4
                                        Apr 18, 2024 11:24:36.870325089 CEST49742587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.044287920 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.113869905 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.291347980 CEST5874973194.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:41.292001009 CEST49731587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.293773890 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.360810041 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:41.360914946 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.540301085 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:41.540383101 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.611841917 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:41.611999035 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.791186094 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:41.791403055 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:41.858880997 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:41.859009981 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.038404942 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.038570881 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.107530117 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.108215094 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.287306070 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.287698030 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.366795063 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.366839886 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.366877079 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.366908073 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.369359970 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.541903973 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.542036057 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.542076111 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.542392969 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.546686888 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.617464066 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.622288942 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.793339014 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.795981884 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:42.869008064 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:42.870999098 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.042428970 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.043426037 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.118227005 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.118494987 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.123796940 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.125824928 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.142425060 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.250843048 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.290484905 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.294681072 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.387569904 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.387710094 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.403970957 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.410283089 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.410295963 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.410325050 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.410351038 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.411055088 CEST5874974494.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.411097050 CEST49744587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.411935091 CEST5874974594.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.412092924 CEST49745587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.495534897 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.495614052 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.637373924 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.682764053 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.744364977 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:43.792182922 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.832729101 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:43.832808018 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:44.077501059 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:44.077743053 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:44.077789068 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:44.077922106 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:44.324347973 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:44.324609995 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:44.370240927 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:44.370242119 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.161446095 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.161487103 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.416373968 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.416434050 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.416474104 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.416488886 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.418219090 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.418260098 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.418294907 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.418315887 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.422194004 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.424025059 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.666948080 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.668968916 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.678468943 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.678740025 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.923350096 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.923561096 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:45.923562050 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:45.923707962 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:46.208255053 CEST5874974794.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:46.208273888 CEST5874974694.199.200.238192.168.2.4
                                        Apr 18, 2024 11:25:52.340931892 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:52.395828962 CEST49748587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:52.670821905 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:53.167154074 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:53.386683941 CEST49749587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:53.464042902 CEST49748587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:53.824827909 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:54.090353012 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:54.090389967 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:54.161540985 CEST49750587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:54.464073896 CEST49749587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:54.667226076 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:54.667274952 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:55.167119026 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:55.167227030 CEST49750587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:55.463993073 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:55.464067936 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:55.464128971 CEST49748587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:56.464004040 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:56.464129925 CEST49749587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:57.167129993 CEST49750587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:57.167138100 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:57.167151928 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:57.701217890 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:25:59.528543949 CEST49748587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:00.130506039 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:00.260860920 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:00.354602098 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:00.464147091 CEST49749587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:01.167284012 CEST49750587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:04.965436935 CEST49733587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:06.410512924 CEST49746587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:06.464071989 CEST49747587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:07.629355907 CEST49748587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:08.465383053 CEST49749587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:09.262712955 CEST49750587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:12.240015984 CEST49751587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:13.245260954 CEST49751587192.168.2.494.199.200.238
                                        Apr 18, 2024 11:26:14.573409081 CEST49733587192.168.2.494.199.200.238
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 18, 2024 11:24:06.200213909 CEST6027053192.168.2.41.1.1.1
                                        Apr 18, 2024 11:24:06.306721926 CEST53602701.1.1.1192.168.2.4
                                        Apr 18, 2024 11:24:07.610055923 CEST5392453192.168.2.41.1.1.1
                                        Apr 18, 2024 11:24:08.157241106 CEST53539241.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Apr 18, 2024 11:24:06.200213909 CEST192.168.2.41.1.1.10x431dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                        Apr 18, 2024 11:24:07.610055923 CEST192.168.2.41.1.1.10xc914Standard query (0)mail.flexwelltour.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Apr 18, 2024 11:24:06.306721926 CEST1.1.1.1192.168.2.40x431dNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                        Apr 18, 2024 11:24:06.306721926 CEST1.1.1.1192.168.2.40x431dNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                        Apr 18, 2024 11:24:06.306721926 CEST1.1.1.1192.168.2.40x431dNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                        Apr 18, 2024 11:24:08.157241106 CEST1.1.1.1192.168.2.40xc914No error (0)mail.flexwelltour.comflexwelltour.comCNAME (Canonical name)IN (0x0001)false
                                        Apr 18, 2024 11:24:08.157241106 CEST1.1.1.1192.168.2.40xc914No error (0)flexwelltour.com94.199.200.238A (IP address)IN (0x0001)false
                                        • api.ipify.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449730172.67.74.152443332C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-18 09:24:06 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-04-18 09:24:06 UTC211INHTTP/1.1 200 OK
                                        Date: Thu, 18 Apr 2024 09:24:06 GMT
                                        Content-Type: text/plain
                                        Content-Length: 12
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 876399966b1906e2-ATL
                                        2024-04-18 09:24:06 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                        Data Ascii: 81.181.57.52


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.449732172.67.74.1524437524C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-18 09:24:12 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-04-18 09:24:12 UTC211INHTTP/1.1 200 OK
                                        Date: Thu, 18 Apr 2024 09:24:12 GMT
                                        Content-Type: text/plain
                                        Content-Length: 12
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 876399bb0c99b0b8-ATL
                                        2024-04-18 09:24:12 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                        Data Ascii: 81.181.57.52


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.449739172.67.74.1524437996C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-18 09:24:23 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-04-18 09:24:23 UTC211INHTTP/1.1 200 OK
                                        Date: Thu, 18 Apr 2024 09:24:23 GMT
                                        Content-Type: text/plain
                                        Content-Length: 12
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 87639a0049a26736-ATL
                                        2024-04-18 09:24:23 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                        Data Ascii: 81.181.57.52


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.449741172.67.74.1524436180C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-18 09:24:31 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-04-18 09:24:31 UTC211INHTTP/1.1 200 OK
                                        Date: Thu, 18 Apr 2024 09:24:31 GMT
                                        Content-Type: text/plain
                                        Content-Length: 12
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 87639a32c900452c-ATL
                                        2024-04-18 09:24:31 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                        Data Ascii: 81.181.57.52


                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Apr 18, 2024 11:24:08.780041933 CEST5874973194.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:24:08 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:24:08.780292988 CEST49731587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:24:09.027519941 CEST5874973194.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:24:09.027913094 CEST49731587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:24:09.276181936 CEST5874973194.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:24:14.047209978 CEST5874973394.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:24:13 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:24:14.047477961 CEST49733587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:24:14.290776014 CEST5874973394.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:24:14.290951967 CEST49733587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:24:14.535862923 CEST5874973394.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:24:24.800533056 CEST5874974094.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:24:24 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:24:24.800734997 CEST49740587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:24:25.046039104 CEST5874974094.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:24:25.046221972 CEST49740587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:24:25.292879105 CEST5874974094.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:24:33.025479078 CEST5874974294.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:24:32 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:24:33.025702000 CEST49742587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:24:33.272602081 CEST5874974294.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:24:33.272810936 CEST49742587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:24:33.520772934 CEST5874974294.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:25:41.611841917 CEST5874974494.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:25:41 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:25:41.611999035 CEST49744587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:25:41.791186094 CEST5874974594.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:25:41 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:25:41.791403055 CEST49745587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:25:41.858880997 CEST5874974494.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:25:41.859009981 CEST49744587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:25:42.038404942 CEST5874974594.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:25:42.038570881 CEST49745587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:25:42.107530117 CEST5874974494.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:25:42.287306070 CEST5874974594.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:25:43.410295963 CEST5874974494.199.200.238192.168.2.4421 srvc235.trwww.com lost input connection
                                        Apr 18, 2024 11:25:43.637373924 CEST5874974694.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:25:43 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:25:43.744364977 CEST5874974794.199.200.238192.168.2.4220-srvc235.trwww.com ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 12:25:43 +0300
                                        220-We do not authorize the use of this system to transport unsolicited,
                                        220 and/or bulk e-mail.
                                        Apr 18, 2024 11:25:43.832729101 CEST49746587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:25:43.832808018 CEST49747587192.168.2.494.199.200.238EHLO 609290
                                        Apr 18, 2024 11:25:44.077501059 CEST5874974794.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:25:44.077743053 CEST49747587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:25:44.077789068 CEST5874974694.199.200.238192.168.2.4250-srvc235.trwww.com Hello 609290 [81.181.57.52]
                                        250-SIZE 52428800
                                        250-8BITMIME
                                        250-PIPELINING
                                        250-PIPECONNECT
                                        250-AUTH PLAIN LOGIN
                                        250-STARTTLS
                                        250 HELP
                                        Apr 18, 2024 11:25:44.077922106 CEST49746587192.168.2.494.199.200.238STARTTLS
                                        Apr 18, 2024 11:25:44.324347973 CEST5874974794.199.200.238192.168.2.4220 TLS go ahead
                                        Apr 18, 2024 11:25:44.324609995 CEST5874974694.199.200.238192.168.2.4220 TLS go ahead

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:11:24:00
                                        Start date:18/04/2024
                                        Path:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                                        Imagebase:0x7a0000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1749314625.0000000003C58000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1749314625.00000000046D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:11:24:03
                                        Start date:18/04/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                                        Imagebase:0xf0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:2
                                        Start time:11:24:03
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:11:24:03
                                        Start date:18/04/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                                        Imagebase:0xf0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:11:24:03
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:11:24:03
                                        Start date:18/04/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5779.tmp"
                                        Imagebase:0x3a0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:11:24:03
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:11:24:04
                                        Start date:18/04/2024
                                        Path:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                                        Imagebase:0x170000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:8
                                        Start time:11:24:04
                                        Start date:18/04/2024
                                        Path:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                                        Imagebase:0x550000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:9
                                        Start time:11:24:04
                                        Start date:18/04/2024
                                        Path:C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\BKG#SGN2106728.PDF.exe"
                                        Imagebase:0xc90000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2932875412.00000000030C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2932875412.00000000030BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2932875412.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2932875412.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:10
                                        Start time:11:24:05
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        Imagebase:0x280000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.1811050369.000000000399F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 45%, ReversingLabs
                                        • Detection: 44%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:11:24:06
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                        Imagebase:0x7ff693ab0000
                                        File size:496'640 bytes
                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:11:24:10
                                        Start date:18/04/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp6F75.tmp"
                                        Imagebase:0x3a0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:13
                                        Start time:11:24:10
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:14
                                        Start time:11:24:10
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                                        Imagebase:0xa0000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:15
                                        Start time:11:24:10
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\eDnxmGWzJ.exe"
                                        Imagebase:0xe40000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2934216134.000000000347A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2934216134.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2934216134.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2934216134.0000000003482000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:17
                                        Start time:11:24:18
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                                        Imagebase:0x4a0000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 45%, ReversingLabs
                                        • Detection: 44%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:18
                                        Start time:11:24:21
                                        Start date:18/04/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmp9D3C.tmp"
                                        Imagebase:0x3a0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:19
                                        Start time:11:24:21
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:20
                                        Start time:11:24:21
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                                        Imagebase:0x130000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:21
                                        Start time:11:24:22
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                                        Imagebase:0x30000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:11:24:22
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                                        Imagebase:0xb50000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.1983604428.0000000002F8C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.1983604428.0000000002F94000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000016.00000002.1983604428.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000016.00000002.1983604428.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Has exited:true

                                        Target ID:25
                                        Start time:11:24:26
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                                        Imagebase:0xc80000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:11:24:29
                                        Start date:18/04/2024
                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eDnxmGWzJ" /XML "C:\Users\user\AppData\Local\Temp\tmpBC2E.tmp"
                                        Imagebase:0x3a0000
                                        File size:187'904 bytes
                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:11:24:29
                                        Start date:18/04/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:11:24:30
                                        Start date:18/04/2024
                                        Path:C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
                                        Imagebase:0xcd0000
                                        File size:901'632 bytes
                                        MD5 hash:CCDB29C0D8E287CAD8644E0ADFD56178
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001C.00000002.2933396914.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001C.00000002.2933396914.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001C.00000002.2933396914.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:14.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:10.2%
                                          Total number of Nodes:215
                                          Total number of Limit Nodes:9
                                          execution_graph 20470 12a5919 PostMessageW 20471 12a5954 20470->20471 20202 10e4668 20203 10e4672 20202->20203 20207 10e4758 20202->20207 20212 10e3e28 20203->20212 20208 10e477d 20207->20208 20219 10e4858 20208->20219 20223 10e4868 20208->20223 20213 10e3e33 20212->20213 20231 10e7278 20213->20231 20237 10e7288 20213->20237 20220 10e488f 20219->20220 20222 10e496c 20220->20222 20227 10e44b0 20220->20227 20224 10e488f 20223->20224 20225 10e496c 20224->20225 20226 10e44b0 CreateActCtxA 20224->20226 20226->20225 20228 10e58f8 CreateActCtxA 20227->20228 20230 10e59bb 20228->20230 20232 10e72b1 20231->20232 20233 10e72c8 20232->20233 20243 10e732e 20232->20243 20248 10e7340 20232->20248 20253 10e7878 20232->20253 20233->20233 20238 10e72b1 20237->20238 20239 10e72c8 20238->20239 20240 10e732e 2 API calls 20238->20240 20241 10e7878 2 API calls 20238->20241 20242 10e7340 2 API calls 20238->20242 20239->20239 20240->20239 20241->20239 20242->20239 20245 10e7339 20243->20245 20244 10e7994 20244->20233 20245->20244 20258 10e96b0 20245->20258 20264 10e96e0 20245->20264 20250 10e739d 20248->20250 20249 10e7994 20249->20233 20250->20249 20251 10e96b0 2 API calls 20250->20251 20252 10e96e0 2 API calls 20250->20252 20251->20249 20252->20249 20254 10e795a 20253->20254 20255 10e7994 20254->20255 20256 10e96b0 2 API calls 20254->20256 20257 10e96e0 2 API calls 20254->20257 20255->20233 20256->20255 20257->20255 20259 10e96f0 20258->20259 20261 10e974e 20258->20261 20259->20244 20260 10e97c0 20260->20244 20261->20260 20270 10e8a20 20261->20270 20263 10e986d 20263->20244 20265 10e96f0 20264->20265 20267 10e974e 20264->20267 20265->20244 20266 10e97c0 20266->20244 20267->20266 20268 10e8a20 2 API calls 20267->20268 20269 10e986d 20268->20269 20269->20244 20271 10e8a2b 20270->20271 20274 10e8a50 20271->20274 20273 10e9942 20273->20263 20275 10e8a5b 20274->20275 20278 10e8a80 20275->20278 20277 10e9a45 20277->20273 20279 10e8a8b 20278->20279 20280 10eabcb 20279->20280 20282 10ed278 20279->20282 20280->20277 20286 10ed29f 20282->20286 20290 10ed2b0 20282->20290 20283 10ed28e 20283->20280 20287 10ed2b0 20286->20287 20293 10ed397 20287->20293 20288 10ed2bf 20288->20283 20292 10ed397 2 API calls 20290->20292 20291 10ed2bf 20291->20283 20292->20291 20294 10ed3b9 20293->20294 20295 10ed3dc 20293->20295 20294->20295 20299 10ed630 LoadLibraryExW 20294->20299 20300 10ed640 LoadLibraryExW 20294->20300 20295->20288 20296 10ed3d4 20296->20295 20297 10ed5e0 GetModuleHandleW 20296->20297 20298 10ed60d 20297->20298 20298->20288 20299->20296 20300->20296 20472 10efa38 20473 10efa7e 20472->20473 20477 10efc18 20473->20477 20480 10efc07 20473->20480 20474 10efb6b 20484 10edd90 20477->20484 20481 10efc18 20480->20481 20482 10edd90 DuplicateHandle 20481->20482 20483 10efc46 20482->20483 20483->20474 20485 10efc80 DuplicateHandle 20484->20485 20486 10efc46 20485->20486 20486->20474 20301 12a1a62 20302 12a198c 20301->20302 20303 12a1a20 20301->20303 20302->20303 20306 12a4440 20302->20306 20323 12a4450 20302->20323 20307 12a4450 20306->20307 20308 12a4472 20307->20308 20340 12a4ebf 20307->20340 20345 12a4ab8 20307->20345 20350 12a4758 20307->20350 20356 12a4edb 20307->20356 20360 12a4e05 20307->20360 20365 12a4c44 20307->20365 20371 12a5044 20307->20371 20376 12a4967 20307->20376 20380 12a4b63 20307->20380 20385 12a4d0d 20307->20385 20390 12a4bae 20307->20390 20395 12a4749 20307->20395 20401 12a4f14 20307->20401 20406 12a48b6 20307->20406 20308->20302 20324 12a4455 20323->20324 20325 12a4472 20324->20325 20326 12a4749 2 API calls 20324->20326 20327 12a4bae 2 API calls 20324->20327 20328 12a4d0d 2 API calls 20324->20328 20329 12a4b63 2 API calls 20324->20329 20330 12a4967 2 API calls 20324->20330 20331 12a5044 2 API calls 20324->20331 20332 12a4c44 2 API calls 20324->20332 20333 12a4e05 2 API calls 20324->20333 20334 12a4edb 2 API calls 20324->20334 20335 12a4758 2 API calls 20324->20335 20336 12a4ab8 2 API calls 20324->20336 20337 12a4ebf 2 API calls 20324->20337 20338 12a48b6 2 API calls 20324->20338 20339 12a4f14 2 API calls 20324->20339 20325->20302 20326->20325 20327->20325 20328->20325 20329->20325 20330->20325 20331->20325 20332->20325 20333->20325 20334->20325 20335->20325 20336->20325 20337->20325 20338->20325 20339->20325 20341 12a4b7a 20340->20341 20342 12a4b8f 20340->20342 20412 12a0868 20341->20412 20416 12a0861 20341->20416 20346 12a4adb 20345->20346 20420 12a0ee8 20346->20420 20424 12a0ee0 20346->20424 20347 12a4afc 20352 12a475d 20350->20352 20351 12a48d1 20351->20308 20352->20351 20428 12a1570 20352->20428 20432 12a1565 20352->20432 20436 12a0d48 20356->20436 20440 12a0d50 20356->20440 20357 12a4ef5 20361 12a4e0a 20360->20361 20444 12a5450 20361->20444 20449 12a5441 20361->20449 20362 12a494f 20366 12a4bcf 20365->20366 20367 12a4c4b 20365->20367 20454 12a0e28 20366->20454 20458 12a0e20 20366->20458 20368 12a4fd5 20372 12a5067 20371->20372 20374 12a0ee8 WriteProcessMemory 20372->20374 20375 12a0ee0 WriteProcessMemory 20372->20375 20373 12a51e9 20374->20373 20375->20373 20462 12a0fd8 20376->20462 20466 12a0fd1 20376->20466 20377 12a494f 20381 12a4b69 20380->20381 20383 12a0868 ResumeThread 20381->20383 20384 12a0861 ResumeThread 20381->20384 20382 12a4b8f 20383->20382 20384->20382 20386 12a4adb 20385->20386 20387 12a4afc 20386->20387 20388 12a0ee8 WriteProcessMemory 20386->20388 20389 12a0ee0 WriteProcessMemory 20386->20389 20388->20387 20389->20387 20391 12a4bc0 20390->20391 20393 12a0e28 VirtualAllocEx 20391->20393 20394 12a0e20 VirtualAllocEx 20391->20394 20392 12a4fd5 20393->20392 20394->20392 20397 12a4758 20395->20397 20396 12a48d1 20396->20308 20397->20396 20399 12a1570 CreateProcessA 20397->20399 20400 12a1565 CreateProcessA 20397->20400 20398 12a492a 20399->20398 20400->20398 20404 12a0ee8 WriteProcessMemory 20401->20404 20405 12a0ee0 WriteProcessMemory 20401->20405 20402 12a518c 20402->20308 20403 12a4d6b 20403->20401 20403->20402 20404->20403 20405->20403 20407 12a48d1 20406->20407 20408 12a480d 20406->20408 20407->20308 20408->20407 20410 12a1570 CreateProcessA 20408->20410 20411 12a1565 CreateProcessA 20408->20411 20409 12a492a 20410->20409 20411->20409 20413 12a08a8 ResumeThread 20412->20413 20415 12a08d9 20413->20415 20415->20342 20417 12a08a8 ResumeThread 20416->20417 20419 12a08d9 20417->20419 20419->20342 20421 12a0f30 WriteProcessMemory 20420->20421 20423 12a0f87 20421->20423 20423->20347 20425 12a0f30 WriteProcessMemory 20424->20425 20427 12a0f87 20425->20427 20427->20347 20429 12a15f9 20428->20429 20429->20429 20430 12a175e CreateProcessA 20429->20430 20431 12a17bb 20430->20431 20431->20431 20433 12a1570 20432->20433 20433->20433 20434 12a175e CreateProcessA 20433->20434 20435 12a17bb 20434->20435 20435->20435 20437 12a0d95 Wow64SetThreadContext 20436->20437 20439 12a0ddd 20437->20439 20439->20357 20441 12a0d95 Wow64SetThreadContext 20440->20441 20443 12a0ddd 20441->20443 20443->20357 20445 12a5465 20444->20445 20447 12a0d48 Wow64SetThreadContext 20445->20447 20448 12a0d50 Wow64SetThreadContext 20445->20448 20446 12a547b 20446->20362 20447->20446 20448->20446 20450 12a5465 20449->20450 20452 12a0d48 Wow64SetThreadContext 20450->20452 20453 12a0d50 Wow64SetThreadContext 20450->20453 20451 12a547b 20451->20362 20452->20451 20453->20451 20455 12a0e68 VirtualAllocEx 20454->20455 20457 12a0ea5 20455->20457 20457->20368 20459 12a0e68 VirtualAllocEx 20458->20459 20461 12a0ea5 20459->20461 20461->20368 20463 12a1023 ReadProcessMemory 20462->20463 20465 12a1067 20463->20465 20465->20377 20467 12a0fd8 ReadProcessMemory 20466->20467 20469 12a1067 20467->20469 20469->20377

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 311 10e7340-10e73a4 313 10e73aa-10e754f 311->313 314 10e7979-10e7992 311->314 455 10e7589-10e758b 313->455 456 10e7551-10e7587 313->456 316 10e7a0b-10e7a57 314->316 317 10e7994-10e79ba 314->317 329 10e7a59-10e7a5f 316->329 330 10e7a64-10e7a6c 316->330 322 10e7fd6-10e7fe1 317->322 323 10e79c0-10e79cb 317->323 336 10e8015-10e8018 322->336 337 10e7fe3-10e7ff1 322->337 323->322 324 10e79d1-10e79e9 323->324 324->322 327 10e79ef-10e7a0a call 10e01d8 324->327 331 10e7afc-10e7b3f 329->331 332 10e7a6e-10e7a92 330->332 333 10e7a94 330->333 349 10e7bbc-10e7c1e 331->349 350 10e7b41-10e7b6d 331->350 338 10e7a9b-10e7a9d 332->338 333->338 339 10e801a-10e8020 336->339 340 10e8022-10e8025 336->340 342 10e7ff3-10e8007 337->342 344 10e7a9f-10e7aa1 338->344 345 10e7aa3-10e7ab9 338->345 340->342 346 10e8026-10e8031 340->346 354 10e8009-10e8011 342->354 355 10e8021 342->355 344->331 345->331 364 10e7abb-10e7abe 345->364 352 10e8065-10e806f 346->352 353 10e8033-10e8047 346->353 509 10e7c20 call 10e96b0 349->509 510 10e7c20 call 10e96e0 349->510 350->322 366 10e7b73-10e7b7a 350->366 371 10e8076-10e807d 352->371 357 10e8049-10e8059 353->357 358 10e8087-10e809f 353->358 354->355 362 10e8013 354->362 355->340 357->371 377 10e805b 357->377 373 10e80bc-10e80c0 358->373 374 10e80a1-10e80b5 358->374 362->336 363 10e7c26-10e7c37 363->322 368 10e7c3d-10e7c66 363->368 369 10e7ac4-10e7acc 364->369 366->322 372 10e7b80-10e7b8c 366->372 368->322 375 10e7c6c-10e7c79 368->375 369->322 376 10e7ad2-10e7afa 369->376 380 10e807f-10e8086 371->380 381 10e80c7-10e80d9 371->381 372->322 382 10e7b92-10e7b9e 372->382 373->358 378 10e80c2-10e80c6 373->378 374->373 375->322 383 10e7c7f-10e7c9b 375->383 376->331 376->369 377->352 395 10e810d-10e8126 381->395 396 10e80db-10e8104 381->396 382->322 384 10e7ba4-10e7bb4 382->384 386 10e7d0e-10e7d39 383->386 387 10e7c9d-10e7ca3 383->387 384->349 388 10e7d3b-10e7d3f 386->388 389 10e7d91-10e7da3 386->389 392 10e7ca5-10e7ccd 387->392 393 10e7cd3-10e7d0c 387->393 388->389 394 10e7d41 388->394 397 10e7dac-10e7db0 389->397 398 10e7da5-10e7daa 389->398 392->393 393->386 393->387 400 10e7d46-10e7d54 394->400 408 10e812b-10e8132 395->408 396->408 397->322 405 10e7db6-10e7dbe 397->405 404 10e7e12-10e7e19 398->404 400->322 409 10e7d5a-10e7d6f 400->409 406 10e7e1b-10e7e29 404->406 407 10e7e81-10e7ea1 404->407 405->322 410 10e7dc4-10e7dd1 405->410 406->407 411 10e7e2b-10e7e43 406->411 425 10e7ea4-10e7ecb 407->425 409->322 412 10e7d75-10e7d82 409->412 410->322 415 10e7dd7-10e7de4 410->415 423 10e7e6f-10e7e7f call 10e01d8 411->423 424 10e7e45 411->424 412->322 417 10e7d88-10e7d8f 412->417 415->322 418 10e7dea-10e7e07 415->418 417->389 417->400 418->404 423->425 426 10e7e48-10e7e4a 424->426 429 10e7f57-10e7f6a 425->429 430 10e7ed1-10e7f54 425->430 426->322 431 10e7e50-10e7e5e 426->431 433 10e7f6c-10e7fa7 429->433 434 10e7fcb-10e7fd5 429->434 430->429 431->322 435 10e7e64-10e7e6d 431->435 433->434 446 10e7fa9-10e7fc5 433->446 435->423 435->426 446->434 457 10e758d-10e758f 455->457 458 10e7591-10e759b 455->458 456->455 460 10e759d-10e75b5 457->460 458->460 461 10e75bb-10e75c3 460->461 462 10e75b7-10e75b9 460->462 465 10e75c5-10e75ca 461->465 462->465 467 10e75df-10e760d 465->467 468 10e75cc-10e75d9 465->468 471 10e760f-10e761b 467->471 472 10e7641-10e764b 467->472 468->467 471->472 473 10e761d-10e762a 471->473 474 10e764d 472->474 475 10e7654-10e76de 472->475 478 10e762c-10e762e 473->478 479 10e7630-10e763b 473->479 474->475 485 10e771c-10e772a 475->485 486 10e76e0-10e771a 475->486 478->472 479->472 489 10e7735-10e7786 485->489 486->489 506 10e7789 call 10e8422 489->506 507 10e7789 call 10e8430 489->507 508 10e7789 call 10e84d1 489->508 493 10e778f-10e781d 498 10e781f-10e7849 493->498 499 10e784b-10e7867 493->499 498->499 502 10e7869 499->502 503 10e7875-10e7876 499->503 502->503 503->314 506->493 507->493 508->493 509->363 510->363
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRkq$LRkq$\skq
                                          • API String ID: 0-3619136892
                                          • Opcode ID: 8aa278a268666a2218f180b71ccbcaed05025c78bbed16377a6b4271b1467f0f
                                          • Instruction ID: 2b09e4240405e44b52687047e0c896aa753d07e82654639ddcef8c89da2f0b2c
                                          • Opcode Fuzzy Hash: 8aa278a268666a2218f180b71ccbcaed05025c78bbed16377a6b4271b1467f0f
                                          • Instruction Fuzzy Hash: 86828C75E002298FCB15CF6AD984AADBBF2FF88300F14C5A9E449EB255DB349941CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 549 10e732e-10e7339 551 10e736d-10e73a4 549->551 552 10e733b-10e736c 549->552 554 10e73aa-10e754f 551->554 555 10e7979-10e7992 551->555 552->551 696 10e7589-10e758b 554->696 697 10e7551-10e7587 554->697 557 10e7a0b-10e7a57 555->557 558 10e7994-10e79ba 555->558 570 10e7a59-10e7a5f 557->570 571 10e7a64-10e7a6c 557->571 563 10e7fd6-10e7fe1 558->563 564 10e79c0-10e79cb 558->564 577 10e8015-10e8018 563->577 578 10e7fe3-10e7ff1 563->578 564->563 565 10e79d1-10e79e9 564->565 565->563 568 10e79ef-10e7a0a call 10e01d8 565->568 572 10e7afc-10e7b3f 570->572 573 10e7a6e-10e7a92 571->573 574 10e7a94 571->574 590 10e7bbc-10e7c1e 572->590 591 10e7b41-10e7b6d 572->591 579 10e7a9b-10e7a9d 573->579 574->579 580 10e801a-10e8020 577->580 581 10e8022-10e8025 577->581 583 10e7ff3-10e8007 578->583 585 10e7a9f-10e7aa1 579->585 586 10e7aa3-10e7ab9 579->586 581->583 587 10e8026-10e8031 581->587 595 10e8009-10e8011 583->595 596 10e8021 583->596 585->572 586->572 605 10e7abb-10e7abe 586->605 593 10e8065-10e806f 587->593 594 10e8033-10e8047 587->594 750 10e7c20 call 10e96b0 590->750 751 10e7c20 call 10e96e0 590->751 591->563 607 10e7b73-10e7b7a 591->607 612 10e8076-10e807d 593->612 598 10e8049-10e8059 594->598 599 10e8087-10e809f 594->599 595->596 603 10e8013 595->603 596->581 598->612 618 10e805b 598->618 614 10e80bc-10e80c0 599->614 615 10e80a1-10e80b5 599->615 603->577 604 10e7c26-10e7c37 604->563 609 10e7c3d-10e7c66 604->609 610 10e7ac4-10e7acc 605->610 607->563 613 10e7b80-10e7b8c 607->613 609->563 616 10e7c6c-10e7c79 609->616 610->563 617 10e7ad2-10e7afa 610->617 621 10e807f-10e8086 612->621 622 10e80c7-10e80d9 612->622 613->563 623 10e7b92-10e7b9e 613->623 614->599 619 10e80c2-10e80c6 614->619 615->614 616->563 624 10e7c7f-10e7c9b 616->624 617->572 617->610 618->593 636 10e810d-10e8126 622->636 637 10e80db-10e8104 622->637 623->563 625 10e7ba4-10e7bb4 623->625 627 10e7d0e-10e7d39 624->627 628 10e7c9d-10e7ca3 624->628 625->590 629 10e7d3b-10e7d3f 627->629 630 10e7d91-10e7da3 627->630 633 10e7ca5-10e7ccd 628->633 634 10e7cd3-10e7d0c 628->634 629->630 635 10e7d41 629->635 638 10e7dac-10e7db0 630->638 639 10e7da5-10e7daa 630->639 633->634 634->627 634->628 641 10e7d46-10e7d54 635->641 649 10e812b-10e8132 636->649 637->649 638->563 646 10e7db6-10e7dbe 638->646 645 10e7e12-10e7e19 639->645 641->563 650 10e7d5a-10e7d6f 641->650 647 10e7e1b-10e7e29 645->647 648 10e7e81-10e7ea1 645->648 646->563 651 10e7dc4-10e7dd1 646->651 647->648 652 10e7e2b-10e7e43 647->652 666 10e7ea4-10e7ecb 648->666 650->563 653 10e7d75-10e7d82 650->653 651->563 656 10e7dd7-10e7de4 651->656 664 10e7e6f-10e7e7f call 10e01d8 652->664 665 10e7e45 652->665 653->563 658 10e7d88-10e7d8f 653->658 656->563 659 10e7dea-10e7e07 656->659 658->630 658->641 659->645 664->666 667 10e7e48-10e7e4a 665->667 670 10e7f57-10e7f6a 666->670 671 10e7ed1-10e7f54 666->671 667->563 672 10e7e50-10e7e5e 667->672 674 10e7f6c-10e7fa7 670->674 675 10e7fcb-10e7fd5 670->675 671->670 672->563 676 10e7e64-10e7e6d 672->676 674->675 687 10e7fa9-10e7fc5 674->687 676->664 676->667 687->675 698 10e758d-10e758f 696->698 699 10e7591-10e759b 696->699 697->696 701 10e759d-10e75b5 698->701 699->701 702 10e75bb-10e75c3 701->702 703 10e75b7-10e75b9 701->703 706 10e75c5-10e75ca 702->706 703->706 708 10e75df-10e760d 706->708 709 10e75cc-10e75d9 706->709 712 10e760f-10e761b 708->712 713 10e7641-10e764b 708->713 709->708 712->713 714 10e761d-10e762a 712->714 715 10e764d 713->715 716 10e7654-10e76de 713->716 719 10e762c-10e762e 714->719 720 10e7630-10e763b 714->720 715->716 726 10e771c-10e772a 716->726 727 10e76e0-10e771a 716->727 719->713 720->713 730 10e7735-10e7786 726->730 727->730 747 10e7789 call 10e8422 730->747 748 10e7789 call 10e8430 730->748 749 10e7789 call 10e84d1 730->749 734 10e778f-10e781d 739 10e781f-10e7849 734->739 740 10e784b-10e7867 734->740 739->740 743 10e7869 740->743 744 10e7875-10e7876 740->744 743->744 744->555 747->734 748->734 749->734 750->604 751->604
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRkq$\skq
                                          • API String ID: 0-3259353708
                                          • Opcode ID: b877433f77677279d6c66038cee44b08c5b2cfa41e99665642a6ead283fc688b
                                          • Instruction ID: ebb03ce29860e462592b63a017ab52bc78cd61a8e54009d81f006e5646d10876
                                          • Opcode Fuzzy Hash: b877433f77677279d6c66038cee44b08c5b2cfa41e99665642a6ead283fc688b
                                          • Instruction Fuzzy Hash: 0FE18E75E012298FDB14CF7AD984AAEB7F2BF88301F118569E446EB354DB34A905CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \skq
                                          • API String ID: 0-1461930697
                                          • Opcode ID: 64d4e7933055813b3072f8d7a0b64472003ee5d226c8125633c8df484e30fcee
                                          • Instruction ID: 09e1b406e1e3c71636f8658fba7966d7a43e2876d442c4593f31a7198fcf9e20
                                          • Opcode Fuzzy Hash: 64d4e7933055813b3072f8d7a0b64472003ee5d226c8125633c8df484e30fcee
                                          • Instruction Fuzzy Hash: 57811CB8E4020E9FDF54CFAAD884AADBBF1BF48300F10A655D406EB295DB319A41CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3916222277
                                          • Opcode ID: b5c847ba6d116384994f9ec6a3d9c9a85ed08de3d4c8d1d3a32a8c1ca1b3a200
                                          • Instruction ID: 97902a5a23a040c9c068ffccb659234c35532b80fe01bdb2b22dc92fc5cc8a07
                                          • Opcode Fuzzy Hash: b5c847ba6d116384994f9ec6a3d9c9a85ed08de3d4c8d1d3a32a8c1ca1b3a200
                                          • Instruction Fuzzy Hash: 3631AC31F501198FCB09CB7DD9846AEBBF2AFC821671985BAE505D7359EA34EC428780
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0bda63379c923d3385159da277070d4e16f6a1a368c871693bbfc527f666c2f5
                                          • Instruction ID: 4a4975902deb28f5ba93d077ea8ca19dcbaa6414c02d712cea78456a69b2d7b3
                                          • Opcode Fuzzy Hash: 0bda63379c923d3385159da277070d4e16f6a1a368c871693bbfc527f666c2f5
                                          • Instruction Fuzzy Hash: C3817132F105158FD754DB69D894A9EB7E3AFC8710F1AC069E449EB369DE34EC018B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d61187ce9bbda943d2d0817d92a21152e425f9f2478946308aa49ea3d450bea
                                          • Instruction ID: 872aa36f6f0a0c6771f51cc65c106cf543e0797c5f41aaf177762f1faf7a289d
                                          • Opcode Fuzzy Hash: 0d61187ce9bbda943d2d0817d92a21152e425f9f2478946308aa49ea3d450bea
                                          • Instruction Fuzzy Hash: 99613032F105258FD754DB69C884A9EB7E3AFC8710F1AC169D449AB369DE34EC018B80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0f0109a3e6ca744c4f2f1f8eb8f609b30d88abadd221a32e86ffa834263a353
                                          • Instruction ID: 6c7796713905a29c3c1f144aa77ef72b9333ae408ed3c9b64eca0fa03ad2e54b
                                          • Opcode Fuzzy Hash: b0f0109a3e6ca744c4f2f1f8eb8f609b30d88abadd221a32e86ffa834263a353
                                          • Instruction Fuzzy Hash: CB713371D25259CFEB28DF66DC017E9BBB6BF89300F14D1AAD409A6250EBB05A81CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 752 12a1565-12a1605 755 12a163e-12a165e 752->755 756 12a1607-12a1611 752->756 761 12a1660-12a166a 755->761 762 12a1697-12a16c6 755->762 756->755 757 12a1613-12a1615 756->757 759 12a1638-12a163b 757->759 760 12a1617-12a1621 757->760 759->755 763 12a1623 760->763 764 12a1625-12a1634 760->764 761->762 766 12a166c-12a166e 761->766 770 12a16c8-12a16d2 762->770 771 12a16ff-12a17b9 CreateProcessA 762->771 763->764 764->764 765 12a1636 764->765 765->759 767 12a1670-12a167a 766->767 768 12a1691-12a1694 766->768 772 12a167e-12a168d 767->772 773 12a167c 767->773 768->762 770->771 774 12a16d4-12a16d6 770->774 784 12a17bb-12a17c1 771->784 785 12a17c2-12a1848 771->785 772->772 775 12a168f 772->775 773->772 776 12a16d8-12a16e2 774->776 777 12a16f9-12a16fc 774->777 775->768 779 12a16e6-12a16f5 776->779 780 12a16e4 776->780 777->771 779->779 781 12a16f7 779->781 780->779 781->777 784->785 795 12a184a-12a184e 785->795 796 12a1858-12a185c 785->796 795->796 797 12a1850 795->797 798 12a185e-12a1862 796->798 799 12a186c-12a1870 796->799 797->796 798->799 800 12a1864 798->800 801 12a1872-12a1876 799->801 802 12a1880-12a1884 799->802 800->799 801->802 803 12a1878 801->803 804 12a1896-12a189d 802->804 805 12a1886-12a188c 802->805 803->802 806 12a189f-12a18ae 804->806 807 12a18b4 804->807 805->804 806->807 809 12a18b5 807->809 809->809
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 012A17A6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 7526a7da2af40cdccdb417770be00515688ed8c871df94d266ad3ab26c0b0294
                                          • Instruction ID: e810dc86d695306e86cfbf398a0ed294235c7ed87560f29bac96701f67f532df
                                          • Opcode Fuzzy Hash: 7526a7da2af40cdccdb417770be00515688ed8c871df94d266ad3ab26c0b0294
                                          • Instruction Fuzzy Hash: 32A16C71D1021ACFEB14CFA9C841BEDBBB2BF48720F5881A9D908E7250DB749995CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 810 12a1570-12a1605 812 12a163e-12a165e 810->812 813 12a1607-12a1611 810->813 818 12a1660-12a166a 812->818 819 12a1697-12a16c6 812->819 813->812 814 12a1613-12a1615 813->814 816 12a1638-12a163b 814->816 817 12a1617-12a1621 814->817 816->812 820 12a1623 817->820 821 12a1625-12a1634 817->821 818->819 823 12a166c-12a166e 818->823 827 12a16c8-12a16d2 819->827 828 12a16ff-12a17b9 CreateProcessA 819->828 820->821 821->821 822 12a1636 821->822 822->816 824 12a1670-12a167a 823->824 825 12a1691-12a1694 823->825 829 12a167e-12a168d 824->829 830 12a167c 824->830 825->819 827->828 831 12a16d4-12a16d6 827->831 841 12a17bb-12a17c1 828->841 842 12a17c2-12a1848 828->842 829->829 832 12a168f 829->832 830->829 833 12a16d8-12a16e2 831->833 834 12a16f9-12a16fc 831->834 832->825 836 12a16e6-12a16f5 833->836 837 12a16e4 833->837 834->828 836->836 838 12a16f7 836->838 837->836 838->834 841->842 852 12a184a-12a184e 842->852 853 12a1858-12a185c 842->853 852->853 854 12a1850 852->854 855 12a185e-12a1862 853->855 856 12a186c-12a1870 853->856 854->853 855->856 857 12a1864 855->857 858 12a1872-12a1876 856->858 859 12a1880-12a1884 856->859 857->856 858->859 860 12a1878 858->860 861 12a1896-12a189d 859->861 862 12a1886-12a188c 859->862 860->859 863 12a189f-12a18ae 861->863 864 12a18b4 861->864 862->861 863->864 866 12a18b5 864->866 866->866
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 012A17A6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: a1f127e81dd49fd12821909679e6d9c301872e70499e5f85e9c32b0f22394885
                                          • Instruction ID: 7d8a012e4f083687ac76f0855cf6d29450800982e60dfc6d0b1db72c24f91481
                                          • Opcode Fuzzy Hash: a1f127e81dd49fd12821909679e6d9c301872e70499e5f85e9c32b0f22394885
                                          • Instruction Fuzzy Hash: 9C916C71D1021ACFEB14CFA9C841BEDBBF2BF48720F5881A9D908A7250DB749995CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 867 10ed397-10ed3b7 868 10ed3b9-10ed3c6 call 10ec700 867->868 869 10ed3e3-10ed3e7 867->869 875 10ed3dc 868->875 876 10ed3c8 868->876 871 10ed3fb-10ed43c 869->871 872 10ed3e9-10ed3f3 869->872 878 10ed43e-10ed446 871->878 879 10ed449-10ed457 871->879 872->871 875->869 922 10ed3ce call 10ed630 876->922 923 10ed3ce call 10ed640 876->923 878->879 880 10ed47b-10ed47d 879->880 881 10ed459-10ed45e 879->881 886 10ed480-10ed487 880->886 883 10ed469 881->883 884 10ed460-10ed467 call 10ec70c 881->884 882 10ed3d4-10ed3d6 882->875 885 10ed518-10ed5d8 882->885 888 10ed46b-10ed479 883->888 884->888 917 10ed5da-10ed5dd 885->917 918 10ed5e0-10ed60b GetModuleHandleW 885->918 889 10ed489-10ed491 886->889 890 10ed494-10ed49b 886->890 888->886 889->890 891 10ed49d-10ed4a5 890->891 892 10ed4a8-10ed4b1 call 10ec71c 890->892 891->892 898 10ed4be-10ed4c3 892->898 899 10ed4b3-10ed4bb 892->899 900 10ed4c5-10ed4cc 898->900 901 10ed4e1-10ed4e5 898->901 899->898 900->901 903 10ed4ce-10ed4de call 10ec72c call 10ec73c 900->903 924 10ed4e8 call 10ed910 901->924 925 10ed4e8 call 10ed940 901->925 903->901 906 10ed4eb-10ed4ee 908 10ed4f0-10ed50e 906->908 909 10ed511-10ed517 906->909 908->909 917->918 919 10ed60d-10ed613 918->919 920 10ed614-10ed628 918->920 919->920 922->882 923->882 924->906 925->906
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 010ED5FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: a4f25ec321adc195a10141fec663b7a6bf10c202649558833f62ac539051b613
                                          • Instruction ID: ba0f53cd8f3b8c362e0a5e5ef307ac284e1557cd7d15ba2245e0f89f649a75a1
                                          • Opcode Fuzzy Hash: a4f25ec321adc195a10141fec663b7a6bf10c202649558833f62ac539051b613
                                          • Instruction Fuzzy Hash: 688156B0A00B058FD764DF6AD04979ABBF1FF88304F00896DD48ADBA50DB75E945CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 926 10e58ec-10e59b9 CreateActCtxA 928 10e59bb-10e59c1 926->928 929 10e59c2-10e5a1c 926->929 928->929 936 10e5a1e-10e5a21 929->936 937 10e5a2b-10e5a2f 929->937 936->937 938 10e5a40 937->938 939 10e5a31-10e5a3d 937->939 941 10e5a41 938->941 939->938 941->941
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 010E59A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 1365f983288d60dbdf7aca198f26ad229b8d3ee1031e7d759ce5b59aff62a84b
                                          • Instruction ID: a09af0159e3104a51f46ddd04eb8473929b60333ec0aca7b73b0e04fe8f09ce8
                                          • Opcode Fuzzy Hash: 1365f983288d60dbdf7aca198f26ad229b8d3ee1031e7d759ce5b59aff62a84b
                                          • Instruction Fuzzy Hash: AA4115B4C00719CEDB24CFAAC884BDDBBF1BF49304F24809AD449AB255DB755946CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 942 10e44b0-10e59b9 CreateActCtxA 945 10e59bb-10e59c1 942->945 946 10e59c2-10e5a1c 942->946 945->946 953 10e5a1e-10e5a21 946->953 954 10e5a2b-10e5a2f 946->954 953->954 955 10e5a40 954->955 956 10e5a31-10e5a3d 954->956 958 10e5a41 955->958 956->955 958->958
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 010E59A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: fccea23be9a571e346f0d2bba49409fafbebe64a7ae744702cdf961ae5dab83e
                                          • Instruction ID: 4522f4a82b3f78c601124f616a4f46b364bd1eb560fb094f131ff3a7e2b5b959
                                          • Opcode Fuzzy Hash: fccea23be9a571e346f0d2bba49409fafbebe64a7ae744702cdf961ae5dab83e
                                          • Instruction Fuzzy Hash: 874102B0C0071DCFDB24CFAAC888A8DBBF5BF48304F2484AAD409AB251DB756945CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 959 12a0ee0-12a0f36 961 12a0f38-12a0f44 959->961 962 12a0f46-12a0f85 WriteProcessMemory 959->962 961->962 964 12a0f8e-12a0fbe 962->964 965 12a0f87-12a0f8d 962->965 965->964
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 012A0F78
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: ae252501b505a9fddb48b9af13eb9b35fc5f9c5d73ca2c3b1931317a1a9b4cca
                                          • Instruction ID: 6e949911a8473b46251922cd77e6e6be6c0ba00be3c0732055443ac753644e9d
                                          • Opcode Fuzzy Hash: ae252501b505a9fddb48b9af13eb9b35fc5f9c5d73ca2c3b1931317a1a9b4cca
                                          • Instruction Fuzzy Hash: EA215AB1900359CFDB10CFA9C885BEEBBF5FF48310F14842AE959A7250C7789545CB65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 969 12a0ee8-12a0f36 971 12a0f38-12a0f44 969->971 972 12a0f46-12a0f85 WriteProcessMemory 969->972 971->972 974 12a0f8e-12a0fbe 972->974 975 12a0f87-12a0f8d 972->975 975->974
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 012A0F78
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 1f62b8fab014fea913f6a7009a78e6979c5f0283ce85f5d472c24fbbbc550d9e
                                          • Instruction ID: e31868aa9f37d490febe4b9fb4f6e3a5775c7acb1878d90f4b075addd39bfb07
                                          • Opcode Fuzzy Hash: 1f62b8fab014fea913f6a7009a78e6979c5f0283ce85f5d472c24fbbbc550d9e
                                          • Instruction Fuzzy Hash: B22157B1900349DFCB10CFA9C884BDEBBF5FF48320F10842AE958A7250C7789944CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 979 12a0d48-12a0d9b 981 12a0dab-12a0ddb Wow64SetThreadContext 979->981 982 12a0d9d-12a0da9 979->982 984 12a0ddd-12a0de3 981->984 985 12a0de4-12a0e14 981->985 982->981 984->985
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 012A0DCE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 859d88bf4ff4a4e3202bd8a19600eb70da6d7aef699e9026a73381adc776d533
                                          • Instruction ID: d14fc7ff1120fb5e3c4005024abcdd99576d52f81c199a9301a1bb75e90867b2
                                          • Opcode Fuzzy Hash: 859d88bf4ff4a4e3202bd8a19600eb70da6d7aef699e9026a73381adc776d533
                                          • Instruction Fuzzy Hash: F52148B1D103098FDB10CFAAC4857EEBBF4EF88324F50842AD559A7250C7789985CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 012A1058
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 157e48105f9cdb134bdf8689e2c1958be898a81c8fc9733b887c234fa43ef1fd
                                          • Instruction ID: ae37c240e58c32db569a365b42656773e25b6fa9f86cbce32e26b54026fb5d5a
                                          • Opcode Fuzzy Hash: 157e48105f9cdb134bdf8689e2c1958be898a81c8fc9733b887c234fa43ef1fd
                                          • Instruction Fuzzy Hash: 6D2148B1900359DFCB10DFAAC884AEEFBF5FF48320F50842AE959A7250C7749554CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 989 10edd90-10efd14 DuplicateHandle 991 10efd1d-10efd3a 989->991 992 10efd16-10efd1c 989->992 992->991
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,010EFC46,?,?,?,?,?), ref: 010EFD07
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 9bb052c8b5eff7d1fe760cbd80e6da8a203b91ec554ed564bea22beee0183eb3
                                          • Instruction ID: 988ad6254e7d6fdb47a1b580903ab09933e000b9bf4002f41c7e0bb12743cd76
                                          • Opcode Fuzzy Hash: 9bb052c8b5eff7d1fe760cbd80e6da8a203b91ec554ed564bea22beee0183eb3
                                          • Instruction Fuzzy Hash: 242105B59002499FDB10CF9AD984ADEFFF5EB48310F24801AE954A7310D374A950CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 012A0DCE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: fc5f763ef3b06b2c6cb76d815e310a90462e2d67fb187bda44e24924c14673da
                                          • Instruction ID: b329a344e6178e0cfda9016ea54ccb54dc6f75187baa3dfdc1a533708c88324b
                                          • Opcode Fuzzy Hash: fc5f763ef3b06b2c6cb76d815e310a90462e2d67fb187bda44e24924c14673da
                                          • Instruction Fuzzy Hash: 262149B19003098FDB10DFAAC4857EEBFF4EF88324F54842AD559A7250C778A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 012A1058
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: ffa52b358506b262e175666f7893ac93360ab58a8b56c65e66300bdb2b810063
                                          • Instruction ID: 55d56ca68e167023927d61233c3a4e265b75a8726a910862121d941321d1f6f3
                                          • Opcode Fuzzy Hash: ffa52b358506b262e175666f7893ac93360ab58a8b56c65e66300bdb2b810063
                                          • Instruction Fuzzy Hash: E62139B1900359DFCB10DFAAC844AEEFBF5FF48320F508429E959A7250C7749554CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,010EFC46,?,?,?,?,?), ref: 010EFD07
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: fc6aee020d459c93de36cfa044230c91f25acf32f104c75edf1f8671160979ba
                                          • Instruction ID: 75d9056bfac9bc8d4be89e3fbca1436186b03804f8434928e80dc51a46ef2bb9
                                          • Opcode Fuzzy Hash: fc6aee020d459c93de36cfa044230c91f25acf32f104c75edf1f8671160979ba
                                          • Instruction Fuzzy Hash: 6E21F2B59002499FDB10CFAAD984AEEBFF5EB08310F24845AE958A7321D374A940CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 012A0E96
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: c6db77373dbdde03cc385316c08ebaa4592c4a3bbf551324cf5bcdd6987a3cb2
                                          • Instruction ID: 12bc39bbf0d7de1004867572209b62bbe12c57efbdb0a3e8b007c02b1c4272d2
                                          • Opcode Fuzzy Hash: c6db77373dbdde03cc385316c08ebaa4592c4a3bbf551324cf5bcdd6987a3cb2
                                          • Instruction Fuzzy Hash: E6115972900249DFCB10DFAAC944BEEBFF5EF88320F248419E555A7260C7359940CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,010ED679,00000800,00000000,00000000), ref: 010ED88A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 4b48eaa003492288f8021bc49a02412cdeb61671e69f6e2bbf9bcf480674698b
                                          • Instruction ID: b9b1d76c575201b66794f59b779f873ce25c599549f802cb4bc0327ab126fad5
                                          • Opcode Fuzzy Hash: 4b48eaa003492288f8021bc49a02412cdeb61671e69f6e2bbf9bcf480674698b
                                          • Instruction Fuzzy Hash: B11126B6D003489FDB14CF9AC948ADEFBF4EB48320F10846AD559A7210C375A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 012A0E96
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 87e5be6f14ed7c2355a2feae4857f1672adbbbadce6c77770d9f0622e3cbbabb
                                          • Instruction ID: 80e87c164b3cf68faebb49cb6b202c3fb377fffc69f613b02f427319a93e7389
                                          • Opcode Fuzzy Hash: 87e5be6f14ed7c2355a2feae4857f1672adbbbadce6c77770d9f0622e3cbbabb
                                          • Instruction Fuzzy Hash: A91126729002499FCB10DFAAC944ADEBFF5EB48320F248819E555A7260C775A544CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: ab661239187d145e91d491dcc5c6b0324c64677285959810ae8877c74969a386
                                          • Instruction ID: de13237fab50ac9f4c9f82ad49aae63103c9c3eca1c1e974bb81c0b00f172bc1
                                          • Opcode Fuzzy Hash: ab661239187d145e91d491dcc5c6b0324c64677285959810ae8877c74969a386
                                          • Instruction Fuzzy Hash: 8E1137B1D002498FCB14DFA9C8457EEFBF4AF88324F248829D555A7650C738A544CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,010ED679,00000800,00000000,00000000), ref: 010ED88A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 5b718549031e4eb69801c3117cbc93754a3213eff12df9a071b137ded9b96f89
                                          • Instruction ID: c326f0ce798e4d0df88a9e3e7c2c010030c75a5676d25c561011b82c176a0fa1
                                          • Opcode Fuzzy Hash: 5b718549031e4eb69801c3117cbc93754a3213eff12df9a071b137ded9b96f89
                                          • Instruction Fuzzy Hash: C01134B6C003488FDB14CF9AC548ADEFBF4EB48320F14846AD959A7210C379A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 0a4ee80afe79a6bf35264d4289fc106079fc564791592122e7cf73d3d7a33ae7
                                          • Instruction ID: ddb254c5ee80c68a16ef34e4fda9e93cf083c74c4b48215dcb3c5228b295d512
                                          • Opcode Fuzzy Hash: 0a4ee80afe79a6bf35264d4289fc106079fc564791592122e7cf73d3d7a33ae7
                                          • Instruction Fuzzy Hash: 45113AB1D003498FDB14DFAAC4457DEFBF4EB88324F248829D559A7250C775A544CF98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 010ED5FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6e38ab4b279390facac3f8f7d2918c51545ac0956a474ace129fcd804360d04b
                                          • Instruction ID: 22e34cdad4bdeb3081aad22bedc81190e4019ca1be1a78ee10aa90eb08a9b66e
                                          • Opcode Fuzzy Hash: 6e38ab4b279390facac3f8f7d2918c51545ac0956a474ace129fcd804360d04b
                                          • Instruction Fuzzy Hash: 191122B6C003498FDB10CF9AC848ADEFBF4EF88324F10846AD859A7610C375A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 012A5945
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: c53f08df200a0cf54a205fbc87544a70cfe0b7d01c098637f01c07b814911845
                                          • Instruction ID: a7ec771e64391682838c6e72202cb8122ab080be8ee19b1da548b58357e8d664
                                          • Opcode Fuzzy Hash: c53f08df200a0cf54a205fbc87544a70cfe0b7d01c098637f01c07b814911845
                                          • Instruction Fuzzy Hash: 9FF0E7B5800309DFDB10CF89D444BDEBBF4EB48324F10841AE559A7210C375A594CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746219174.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e3d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3fcb6fb83ff8fd004dddd6029baf4d923fa7a3c78eeef9e9903283c5793892b
                                          • Instruction ID: a053d95d6b0b92a61337410774579f7804fb389b040902e4695184aea9b56098
                                          • Opcode Fuzzy Hash: f3fcb6fb83ff8fd004dddd6029baf4d923fa7a3c78eeef9e9903283c5793892b
                                          • Instruction Fuzzy Hash: 01213771508240EFCB05DF14EDC8B27BF65FB98318F20C569E8095B256C336D856CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746219174.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e3d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d5fe7f6c16ff749fb6012b6e043bf18f9ba53723f70895e82c4af26e9c26e3c
                                          • Instruction ID: 754cb8568b403c4cd182a901b411dc7676a6b61f4fdea7e12c27543662cb4a10
                                          • Opcode Fuzzy Hash: 3d5fe7f6c16ff749fb6012b6e043bf18f9ba53723f70895e82c4af26e9c26e3c
                                          • Instruction Fuzzy Hash: 5A213771508204DFDB05DF14EDC8B2ABF65FB98328F20C169E9095B256C336E856CBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746263066.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e4d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3899513ee9e24906a5d62b58ffaa354579abd6dbd7d1ba264c1105e3d2387d3b
                                          • Instruction ID: bb0b83bbb304a4f99ba8bd12b26ecb24997b8a1cdeffec7bf95bb5a9887ead05
                                          • Opcode Fuzzy Hash: 3899513ee9e24906a5d62b58ffaa354579abd6dbd7d1ba264c1105e3d2387d3b
                                          • Instruction Fuzzy Hash: FC212971548304DFCB04DF54E9C4B16BB65FB94318F20C56DE8095B366C3B6D846CAA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746263066.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e4d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ce9282064178758bc62402a70ecb47ee6d9f10896dd51401f164a95f04a30f73
                                          • Instruction ID: 2bd4ec3892e04f8fcea28390ad8970b9e78b11edf460b9306d494c8e297fb27b
                                          • Opcode Fuzzy Hash: ce9282064178758bc62402a70ecb47ee6d9f10896dd51401f164a95f04a30f73
                                          • Instruction Fuzzy Hash: 2B210471608200DFCB14DF14E9C4B26BFA6FB84318F20C56DD80A5B396C33AD847CA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746263066.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e4d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b94599b01788595bb2177a67f003f7a866502216f715daa2e07db1e370a68ef
                                          • Instruction ID: adb6b0bf64ec70dded88b1d22e990cdd1801fd421b2966916b7e00c5b5dbe626
                                          • Opcode Fuzzy Hash: 6b94599b01788595bb2177a67f003f7a866502216f715daa2e07db1e370a68ef
                                          • Instruction Fuzzy Hash: 7821837550D3808FCB02CF24D994715BF71EB46314F28C5EAD8498F2A7C33A980ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746219174.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e3d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 5ef47d6b489b8f543017d49d86300702a16d40700cfbe5d93199277d323aa85b
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 9811E676504280DFCB16CF14E9C4B16BF71FB94328F24C6A9DC494B656C336D85ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746219174.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e3d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: fccfd203ef65d855980b47aeefe8fe0bb93abf8b86b91b30d17630bd30eb301f
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 34110372404240CFCB12CF10E9C4B16BF71FB94328F24C2A9D8090B256C33AE85ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1746263066.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e4d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 558123e1d08481526792ed3ba4debd76c3546bb78a4bd48dadc4666095572f27
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: B111D075508240DFCB01CF50D9C4B15BF61FB44318F24C6A9D8094B666C37AD80ACB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 851eeb4574c489b95bd7ff39bf8ef80818f9613c8ff255fdb0a9123616fc3b02
                                          • Instruction ID: 522141e7ce17f968df0df95fee95a54cb283b915c6801b001d83764ae5c62061
                                          • Opcode Fuzzy Hash: 851eeb4574c489b95bd7ff39bf8ef80818f9613c8ff255fdb0a9123616fc3b02
                                          • Instruction Fuzzy Hash: 01D1BE317107428FEB29EB7AC550BAEBBF6AF89700F54446DD6468B290DB36E801CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 60d8e1dd8eca9f418dfdbe17ac70d740d8bfa8cc669672c9b3dd4e3551872f00
                                          • Instruction ID: 17b0288a1f508ac710261e9231a280f29248917c1fcce44ffc91457cd6654292
                                          • Opcode Fuzzy Hash: 60d8e1dd8eca9f418dfdbe17ac70d740d8bfa8cc669672c9b3dd4e3551872f00
                                          • Instruction Fuzzy Hash: 53E10A74E101198FDB14DFA9C6909AEFBF2FF88304F249169E518AB356DB30A941CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 033965a016abfd5660e094aa855ef197d15592869566c1f1061a1c8dae8cd515
                                          • Instruction ID: 95bcc6218f10813f54841bf36c52668d7db26a4e9ef417c9ba52ebfcc03f37c9
                                          • Opcode Fuzzy Hash: 033965a016abfd5660e094aa855ef197d15592869566c1f1061a1c8dae8cd515
                                          • Instruction Fuzzy Hash: 23E1E674E102198FDB14DFA9C5809AEFBF2FF89304F249169E518AB356DB30A941CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 446c63b6254bb0562a5ab11d6b47e530569446df31a6f44a20365dd54ba492f7
                                          • Instruction ID: a24c53213213635d7d259fcfef4955e461bead581b2c7b6fe77c86d65fc528d4
                                          • Opcode Fuzzy Hash: 446c63b6254bb0562a5ab11d6b47e530569446df31a6f44a20365dd54ba492f7
                                          • Instruction Fuzzy Hash: 24515D70E142598FCB14CF69C9815AEFBF2FF89304F2481AAD418AB216D731A941CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747067339.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_10e0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ef1c4c8ce7de3a95db06e2c8abf9bba47e8955ec7c83ac9ab2c9457974c600b
                                          • Instruction ID: 8a6e9a96201f1686ed2babe3843e2bf8b1d73e4334f86110cfe35656e9d7a539
                                          • Opcode Fuzzy Hash: 7ef1c4c8ce7de3a95db06e2c8abf9bba47e8955ec7c83ac9ab2c9457974c600b
                                          • Instruction Fuzzy Hash: F2414879E5400E8FDF14CFAAE585AADF7F1BF48300B54E219E016EB284CA35A945CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1747446431.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_12a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1969a38fd63d76da11792c6af1b362212a3f64d4758d5524057d6c2fc3c617e
                                          • Instruction ID: 5c4aa697f1f64f82bcc6d87806273585e52e8d044fad81f0ed0fb4dcc4b6bbe1
                                          • Opcode Fuzzy Hash: b1969a38fd63d76da11792c6af1b362212a3f64d4758d5524057d6c2fc3c617e
                                          • Instruction Fuzzy Hash: C321E571D156A88BEB18DFAB9C053DDBAF6AFC9300F08C1AAC40CA6254DBB446468E40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:8.2%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:27
                                          Total number of Limit Nodes:5
                                          execution_graph 40064 14a0848 40066 14a084e 40064->40066 40065 14a091b 40066->40065 40069 14a14b8 40066->40069 40075 14a1393 40066->40075 40071 14a13a6 40069->40071 40072 14a14bf 40069->40072 40070 14a14b0 40070->40066 40071->40070 40074 14a14b8 GlobalMemoryStatusEx 40071->40074 40080 14a8348 40071->40080 40072->40066 40074->40071 40077 14a139c 40075->40077 40076 14a14b0 40076->40066 40077->40076 40078 14a8348 GlobalMemoryStatusEx 40077->40078 40079 14a14b8 GlobalMemoryStatusEx 40077->40079 40078->40077 40079->40077 40081 14a8352 40080->40081 40082 14a836c 40081->40082 40085 6d4f9f7 40081->40085 40089 6d4fa08 40081->40089 40082->40071 40087 6d4fa08 40085->40087 40086 6d4fc32 40086->40082 40087->40086 40088 6d4fc48 GlobalMemoryStatusEx 40087->40088 40088->40087 40091 6d4fa1d 40089->40091 40090 6d4fc32 40090->40082 40091->40090 40092 6d4fc48 GlobalMemoryStatusEx 40091->40092 40092->40091 40093 14a8170 40094 14a81b6 DeleteFileW 40093->40094 40096 14a81ef 40094->40096

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 125 6d43468-6d43489 126 6d4348b-6d4348e 125->126 127 6d434b4-6d434b7 126->127 128 6d43490-6d434af 126->128 129 6d434bd-6d434dc 127->129 130 6d43c58-6d43c5a 127->130 128->127 138 6d434f5-6d434ff 129->138 139 6d434de-6d434e1 129->139 131 6d43c61-6d43c64 130->131 132 6d43c5c 130->132 131->126 134 6d43c6a-6d43c73 131->134 132->131 143 6d43505-6d43516 call 6d43054 138->143 139->138 140 6d434e3-6d434f3 139->140 140->143 145 6d4351b-6d43520 143->145 146 6d43522-6d43528 145->146 147 6d4352d-6d4380a 145->147 146->134 168 6d43810-6d438bf 147->168 169 6d43c4a-6d43c57 147->169 178 6d438c1-6d438e6 168->178 179 6d438e8 168->179 181 6d438f1-6d43904 call 6d43060 178->181 179->181 184 6d43c31-6d43c3d 181->184 185 6d4390a-6d4392c call 6d4306c 181->185 184->168 186 6d43c43 184->186 185->184 189 6d43932-6d4393c 185->189 186->169 189->184 190 6d43942-6d4394d 189->190 190->184 191 6d43953-6d43a29 190->191 203 6d43a37-6d43a67 191->203 204 6d43a2b-6d43a2d 191->204 208 6d43a75-6d43a81 203->208 209 6d43a69-6d43a6b 203->209 204->203 210 6d43ae1-6d43ae5 208->210 211 6d43a83-6d43a87 208->211 209->208 212 6d43c22-6d43c2b 210->212 213 6d43aeb-6d43b27 210->213 211->210 214 6d43a89-6d43ab3 211->214 212->184 212->191 226 6d43b35-6d43b43 213->226 227 6d43b29-6d43b2b 213->227 221 6d43ab5-6d43ab7 214->221 222 6d43ac1-6d43ade call 6d43078 214->222 221->222 222->210 229 6d43b45-6d43b50 226->229 230 6d43b5a-6d43b65 226->230 227->226 229->230 233 6d43b52 229->233 234 6d43b67-6d43b6d 230->234 235 6d43b7d-6d43b8e 230->235 233->230 236 6d43b71-6d43b73 234->236 237 6d43b6f 234->237 239 6d43ba6-6d43bb2 235->239 240 6d43b90-6d43b96 235->240 236->235 237->235 244 6d43bb4-6d43bba 239->244 245 6d43bca-6d43c1b 239->245 241 6d43b98 240->241 242 6d43b9a-6d43b9c 240->242 241->239 242->239 246 6d43bbc 244->246 247 6d43bbe-6d43bc0 244->247 245->212 246->245 247->245
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: ad6b61f035230d1b212f72f47769a7044beb245f27d86997a01f81e42b0ca98f
                                          • Instruction ID: 1b9b0f00acf92ef9d53effca8cee6dbea91d6f75191e53ef69a5e2c10a989f98
                                          • Opcode Fuzzy Hash: ad6b61f035230d1b212f72f47769a7044beb245f27d86997a01f81e42b0ca98f
                                          • Instruction Fuzzy Hash: DC322131E1061A8FCB14EF79C99459DB7B2FFD9300F21866AD409A7264EB34ED85CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 796 6d47d40-6d47d5e 797 6d47d60-6d47d63 796->797 798 6d47d65-6d47d73 797->798 799 6d47d7a-6d47d7d 797->799 807 6d47d75 798->807 808 6d47de6-6d47dfc 798->808 800 6d47d7f-6d47d89 799->800 801 6d47d8a-6d47d8d 799->801 802 6d47dae-6d47db1 801->802 803 6d47d8f-6d47da9 801->803 805 6d47dd4-6d47dd6 802->805 806 6d47db3-6d47dcf 802->806 803->802 810 6d47ddd-6d47de0 805->810 811 6d47dd8 805->811 806->805 807->799 814 6d48017-6d48021 808->814 815 6d47e02-6d47e0b 808->815 810->797 810->808 811->810 817 6d47e11-6d47e2e 815->817 818 6d48022-6d48057 815->818 828 6d48004-6d48011 817->828 829 6d47e34-6d47e5c 817->829 822 6d48059-6d4805c 818->822 824 6d4805e-6d4807a 822->824 825 6d4807f-6d48082 822->825 824->825 826 6d482b7-6d482ba 825->826 827 6d48088-6d48097 825->827 830 6d48365-6d48367 826->830 831 6d482c0-6d482cc 826->831 837 6d480b6-6d480fa 827->837 838 6d48099-6d480b4 827->838 828->814 828->815 829->828 849 6d47e62-6d47e6b 829->849 834 6d4836e-6d48371 830->834 835 6d48369 830->835 840 6d482d7-6d482d9 831->840 834->822 839 6d48377-6d48380 834->839 835->834 853 6d48100-6d48111 837->853 854 6d4828b-6d482a1 837->854 838->837 843 6d482f1-6d482f5 840->843 844 6d482db-6d482e1 840->844 845 6d482f7-6d48301 843->845 846 6d48303 843->846 850 6d482e5-6d482e7 844->850 851 6d482e3 844->851 852 6d48308-6d4830a 845->852 846->852 849->818 855 6d47e71-6d47e8d 849->855 850->843 851->843 856 6d4830c-6d4830f 852->856 857 6d4831b-6d48354 852->857 866 6d48276-6d48285 853->866 867 6d48117-6d48134 853->867 854->826 862 6d47ff2-6d47ffe 855->862 863 6d47e93-6d47ebd 855->863 856->839 857->827 878 6d4835a-6d48364 857->878 862->828 862->849 880 6d47ec3-6d47eeb 863->880 881 6d47fe8-6d47fed 863->881 866->853 866->854 867->866 875 6d4813a-6d48230 call 6d46570 867->875 929 6d48232-6d4823c 875->929 930 6d4823e 875->930 880->881 887 6d47ef1-6d47f1f 880->887 881->862 887->881 893 6d47f25-6d47f2e 887->893 893->881 894 6d47f34-6d47f66 893->894 902 6d47f71-6d47f8d 894->902 903 6d47f68-6d47f6c 894->903 902->862 905 6d47f8f-6d47fe6 call 6d46570 902->905 903->881 904 6d47f6e 903->904 904->902 905->862 931 6d48243-6d48245 929->931 930->931 931->866 932 6d48247-6d4824c 931->932 933 6d4824e-6d48258 932->933 934 6d4825a 932->934 935 6d4825f-6d48261 933->935 934->935 935->866 936 6d48263-6d4826f 935->936 936->866
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq
                                          • API String ID: 0-3550614674
                                          • Opcode ID: 8cfa16eeaf11f43e8173df76c41df0b6200f9763bc4886e1f65274704671bca8
                                          • Instruction ID: bca62d3949e6087222894a4eccef5288359f96cdac0086db6416ca15e92b8cc5
                                          • Opcode Fuzzy Hash: 8cfa16eeaf11f43e8173df76c41df0b6200f9763bc4886e1f65274704671bca8
                                          • Instruction Fuzzy Hash: 8D029E30B006059FCB64EF69D690AAEB7F2FF84340F148569E406AB395DB75EC85CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9fc77ffd0e8928c908591c5bfdad11ad452b8ea8fdf1f513533c2db47a8ce1da
                                          • Instruction ID: 5bc32195e8a519061f0e8ecd622adc3b1bb3c03feb4f528fff46b574b4bbfeec
                                          • Opcode Fuzzy Hash: 9fc77ffd0e8928c908591c5bfdad11ad452b8ea8fdf1f513533c2db47a8ce1da
                                          • Instruction Fuzzy Hash: 34626B34F002458FDB64EF69D594AADB7F2EF89314F148469E406AB394DB35EC85CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: feddd847f570cfe5ba4a5785c5643cb768c6a281100ae4aea531723469ead03a
                                          • Instruction ID: 89b03db2a581558d5400ec4315891d2de5f6c5c424ff5f807bf880187d3ba1a3
                                          • Opcode Fuzzy Hash: feddd847f570cfe5ba4a5785c5643cb768c6a281100ae4aea531723469ead03a
                                          • Instruction Fuzzy Hash: 2412F075F102159BDF64EB64E9806AEB7B2FF85310F248439E956AB394CB34EC41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3cbd090ac16c125b2bb7cf22b362480d8a6f045a3fc246e8b922a0fc9978300d
                                          • Instruction ID: cddcc73d4c84167da8a01651b8f41742a3b4a61c48c7a8184226a1c9d89c0701
                                          • Opcode Fuzzy Hash: 3cbd090ac16c125b2bb7cf22b362480d8a6f045a3fc246e8b922a0fc9978300d
                                          • Instruction Fuzzy Hash: 96228070E002098FDF64EB68D5807AEB7B5FB59310F24882AE449EB395DB35DC81CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 6d4aca0-6d4acbe 1 6d4acc0-6d4acc3 0->1 2 6d4acc5-6d4ace1 1->2 3 6d4ace6-6d4ace9 1->3 2->3 4 6d4ad03-6d4ad06 3->4 5 6d4aceb-6d4acf4 3->5 8 6d4ad16-6d4ad19 4->8 9 6d4ad08-6d4ad11 4->9 6 6d4aed7-6d4af0e 5->6 7 6d4acfa-6d4acfe 5->7 18 6d4af10-6d4af13 6->18 7->4 11 6d4aebd-6d4aec6 8->11 12 6d4ad1f-6d4ad22 8->12 9->8 11->5 16 6d4aecc-6d4aed6 11->16 14 6d4ad24-6d4ad37 12->14 15 6d4ad3c-6d4ad3f 12->15 14->15 19 6d4ad41-6d4ad4e 15->19 20 6d4ad53-6d4ad56 15->20 24 6d4af15-6d4af19 18->24 25 6d4af20-6d4af23 18->25 19->20 22 6d4ad60-6d4ad63 20->22 23 6d4ad58-6d4ad5d 20->23 29 6d4ad74-6d4ad76 22->29 30 6d4ad65-6d4ad69 22->30 23->22 27 6d4af29-6d4af64 24->27 31 6d4af1b 24->31 26 6d4b18c-6d4b18f 25->26 25->27 33 6d4b191 call 6d4b1f8 26->33 34 6d4b19e-6d4b1a1 26->34 42 6d4b157-6d4b16a 27->42 43 6d4af6a-6d4af76 27->43 35 6d4ad7d-6d4ad80 29->35 36 6d4ad78 29->36 30->16 32 6d4ad6f 30->32 31->25 32->29 41 6d4b197-6d4b199 33->41 39 6d4b1a3-6d4b1ad 34->39 40 6d4b1ae-6d4b1b1 34->40 35->1 38 6d4ad86-6d4adaa 35->38 36->35 57 6d4adb0-6d4adbf 38->57 58 6d4aeba 38->58 44 6d4b1d4-6d4b1d6 40->44 45 6d4b1b3-6d4b1cf 40->45 41->34 49 6d4b16c-6d4b16d 42->49 53 6d4af96-6d4afda 43->53 54 6d4af78-6d4af91 43->54 47 6d4b1dd-6d4b1e0 44->47 48 6d4b1d8 44->48 45->44 47->18 50 6d4b1e6-6d4b1f0 47->50 48->47 49->26 74 6d4aff6-6d4b035 53->74 75 6d4afdc-6d4afee 53->75 54->49 63 6d4add7-6d4ae12 call 6d46570 57->63 64 6d4adc1-6d4adc7 57->64 58->11 82 6d4ae14-6d4ae1a 63->82 83 6d4ae2a-6d4ae41 63->83 65 6d4adc9 64->65 66 6d4adcb-6d4adcd 64->66 65->63 66->63 79 6d4b11c-6d4b131 74->79 80 6d4b03b-6d4b116 call 6d46570 74->80 75->74 79->42 80->79 87 6d4ae1c 82->87 88 6d4ae1e-6d4ae20 82->88 93 6d4ae43-6d4ae49 83->93 94 6d4ae59-6d4ae6a 83->94 87->83 88->83 96 6d4ae4d-6d4ae4f 93->96 97 6d4ae4b 93->97 100 6d4ae82-6d4aeb3 94->100 101 6d4ae6c-6d4ae72 94->101 96->94 97->94 100->58 102 6d4ae74 101->102 103 6d4ae76-6d4ae78 101->103 102->100 103->100
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1078448309
                                          • Opcode ID: 720e0dd7a1e1620484ccb8fa4fe53d50ba9a92feef20938114801aa9d04af58f
                                          • Instruction ID: 786d90331c17194d963dc1c0536274f3d111170abf92a22ac756ccdc3cf8851f
                                          • Opcode Fuzzy Hash: 720e0dd7a1e1620484ccb8fa4fe53d50ba9a92feef20938114801aa9d04af58f
                                          • Instruction Fuzzy Hash: E5E15F70F1020A8FDB65EF69D5906AEB7B2EF85300F14852AE415EB358DB35DC46CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 255 6d4b620-6d4b640 256 6d4b642-6d4b645 255->256 257 6d4b647-6d4b64c 256->257 258 6d4b64f-6d4b652 256->258 257->258 259 6d4b654-6d4b65d 258->259 260 6d4b662-6d4b665 258->260 259->260 261 6d4b687-6d4b68a 260->261 262 6d4b667-6d4b682 260->262 263 6d4b906-6d4b907 261->263 264 6d4b690-6d4b693 261->264 262->261 267 6d4b90c-6d4b90f 263->267 265 6d4b695-6d4b69e 264->265 266 6d4b6a9-6d4b6ac 264->266 269 6d4b6a4 265->269 270 6d4b723-6d4b72c 265->270 271 6d4b6c6-6d4b6c9 266->271 272 6d4b6ae-6d4b6b5 266->272 273 6d4b926-6d4b929 267->273 274 6d4b911-6d4b914 267->274 269->266 276 6d4b9c1-6d4b9f6 270->276 281 6d4b732-6d4b739 270->281 279 6d4b71e-6d4b721 271->279 280 6d4b6cb-6d4b719 call 6d46570 271->280 272->276 277 6d4b6bb-6d4b6c1 272->277 282 6d4b939-6d4b93c 273->282 283 6d4b92b-6d4b934 273->283 274->276 278 6d4b91a-6d4b921 274->278 296 6d4b9f8-6d4b9fb 276->296 277->271 278->273 279->270 284 6d4b73e-6d4b741 279->284 280->279 281->284 285 6d4b93e-6d4b944 282->285 286 6d4b949-6d4b94c 282->286 283->282 289 6d4b751-6d4b754 284->289 290 6d4b743-6d4b74c 284->290 285->286 291 6d4b94e-6d4b951 286->291 292 6d4b958-6d4b95b 286->292 298 6d4b756-6d4b759 289->298 299 6d4b75e-6d4b761 289->299 290->289 291->274 293 6d4b953 291->293 294 6d4b96d-6d4b970 292->294 295 6d4b95d 292->295 293->292 294->263 304 6d4b972-6d4b975 294->304 307 6d4b965-6d4b968 295->307 302 6d4bc67-6d4bc6a 296->302 303 6d4ba01-6d4ba29 296->303 298->299 300 6d4b787-6d4b78a 299->300 301 6d4b763-6d4b76a 299->301 300->265 310 6d4b790-6d4b793 300->310 301->276 306 6d4b770-6d4b780 301->306 308 6d4bc6c-6d4bc88 302->308 309 6d4bc8d-6d4bc8f 302->309 348 6d4ba33-6d4ba77 303->348 349 6d4ba2b-6d4ba2e 303->349 311 6d4b977-6d4b97e 304->311 312 6d4b99b-6d4b99e 304->312 332 6d4b782 306->332 333 6d4b7db-6d4b7e2 306->333 307->294 308->309 318 6d4bc96-6d4bc99 309->318 319 6d4bc91 309->319 315 6d4b795-6d4b7b1 310->315 316 6d4b7b6-6d4b7b9 310->316 311->276 317 6d4b980-6d4b990 311->317 312->263 320 6d4b9a4-6d4b9a6 312->320 315->316 324 6d4b7c9-6d4b7cc 316->324 325 6d4b7bb-6d4b7c4 316->325 317->263 340 6d4b996 317->340 318->296 323 6d4bc9f-6d4bca8 318->323 319->318 326 6d4b9ad-6d4b9b0 320->326 327 6d4b9a8 320->327 328 6d4b7d6-6d4b7d9 324->328 329 6d4b7ce-6d4b7d1 324->329 325->324 326->256 330 6d4b9b6-6d4b9c0 326->330 327->326 328->333 337 6d4b803-6d4b806 328->337 329->328 332->300 333->276 338 6d4b7e8-6d4b7f8 333->338 337->291 342 6d4b80c-6d4b80f 337->342 338->311 351 6d4b7fe 338->351 340->312 346 6d4b811-6d4b818 342->346 347 6d4b829-6d4b82c 342->347 346->276 352 6d4b81e-6d4b824 346->352 353 6d4b82e-6d4b843 347->353 354 6d4b86b-6d4b86e 347->354 376 6d4bc5c-6d4bc66 348->376 377 6d4ba7d-6d4ba86 348->377 349->323 351->337 352->347 353->276 366 6d4b849-6d4b866 353->366 355 6d4b870-6d4b885 354->355 356 6d4b8ad-6d4b8b0 354->356 355->276 367 6d4b88b-6d4b8a8 355->367 359 6d4b8b7-6d4b8ba 356->359 360 6d4b8b2-6d4b8b4 356->360 364 6d4b8d4-6d4b8d7 359->364 365 6d4b8bc-6d4b8c3 359->365 360->359 369 6d4b8d9-6d4b8e0 364->369 370 6d4b8eb-6d4b8ee 364->370 365->276 368 6d4b8c9-6d4b8cf 365->368 366->354 367->356 368->364 369->325 371 6d4b8e6 369->371 373 6d4b8f0-6d4b8fc 370->373 374 6d4b901-6d4b904 370->374 371->370 373->374 374->263 374->267 380 6d4bc52-6d4bc57 377->380 381 6d4ba8c-6d4baf8 call 6d46570 377->381 380->376 389 6d4bbf2-6d4bc07 381->389 390 6d4bafe-6d4bb03 381->390 389->380 391 6d4bb05-6d4bb0b 390->391 392 6d4bb1f 390->392 394 6d4bb11-6d4bb13 391->394 395 6d4bb0d-6d4bb0f 391->395 396 6d4bb21-6d4bb27 392->396 397 6d4bb1d 394->397 395->397 398 6d4bb3c-6d4bb49 396->398 399 6d4bb29-6d4bb2f 396->399 397->396 406 6d4bb61-6d4bb6e 398->406 407 6d4bb4b-6d4bb51 398->407 400 6d4bb35 399->400 401 6d4bbdd-6d4bbec 399->401 400->398 402 6d4bba4-6d4bbb1 400->402 403 6d4bb70-6d4bb7d 400->403 401->389 401->390 412 6d4bbb3-6d4bbb9 402->412 413 6d4bbc9-6d4bbd6 402->413 415 6d4bb95-6d4bba2 403->415 416 6d4bb7f-6d4bb85 403->416 406->401 410 6d4bb55-6d4bb57 407->410 411 6d4bb53 407->411 410->406 411->406 417 6d4bbbd-6d4bbbf 412->417 418 6d4bbbb 412->418 413->401 415->401 419 6d4bb87 416->419 420 6d4bb89-6d4bb8b 416->420 417->413 418->413 419->415 420->415
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: dd134489cf08c71549ff03c8d5ffa77b24f82e6314be5392bc4aa0bcc8a4e1a5
                                          • Instruction ID: b66ae270fbf5c9d5e23dce78fd36f3070087733125f24f77bed3c6f436faecaa
                                          • Opcode Fuzzy Hash: dd134489cf08c71549ff03c8d5ffa77b24f82e6314be5392bc4aa0bcc8a4e1a5
                                          • Instruction Fuzzy Hash: C9027C70E102098FDBA4EF68D580AADB7B2FF64310F24896AE455EB355DB35DC81CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 423 6d49110-6d49135 424 6d49137-6d4913a 423->424 425 6d49140-6d49155 424->425 426 6d499f8-6d499fb 424->426 432 6d49157-6d4915d 425->432 433 6d4916d-6d49183 425->433 427 6d49a21-6d49a23 426->427 428 6d499fd-6d49a1c 426->428 429 6d49a25 427->429 430 6d49a2a-6d49a2d 427->430 428->427 429->430 430->424 434 6d49a33-6d49a3d 430->434 436 6d49161-6d49163 432->436 437 6d4915f 432->437 440 6d4918e-6d49190 433->440 436->433 437->433 441 6d49192-6d49198 440->441 442 6d491a8-6d49219 440->442 443 6d4919c-6d4919e 441->443 444 6d4919a 441->444 453 6d49245-6d49261 442->453 454 6d4921b-6d4923e 442->454 443->442 444->442 459 6d49263-6d49286 453->459 460 6d4928d-6d492a8 453->460 454->453 459->460 465 6d492d3-6d492ee 460->465 466 6d492aa-6d492cc 460->466 471 6d492f0-6d4930c 465->471 472 6d49313-6d49321 465->472 466->465 471->472 473 6d49331-6d493ab 472->473 474 6d49323-6d4932c 472->474 480 6d493ad-6d493cb 473->480 481 6d493f8-6d4940d 473->481 474->434 485 6d493e7-6d493f6 480->485 486 6d493cd-6d493dc 480->486 481->426 485->480 485->481 486->485
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: f01ce15864c151115aa7f83f51cbbdcd7193cfae1d369829d591666210a24eaf
                                          • Instruction ID: 08123defcc209184d1a90a905fd2688e215512060a581ae21e01cf7985512082
                                          • Opcode Fuzzy Hash: f01ce15864c151115aa7f83f51cbbdcd7193cfae1d369829d591666210a24eaf
                                          • Instruction Fuzzy Hash: 4E915170F1060A8FDB64DF65D960BAFB3F6EF84240F108969C409AB394EB79DC518B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 489 6d4cf18-6d4cf33 490 6d4cf35-6d4cf38 489->490 491 6d4cf81-6d4cf84 490->491 492 6d4cf3a-6d4cf7c 490->492 493 6d4cf86-6d4cfc8 491->493 494 6d4cfcd-6d4cfd0 491->494 492->491 493->494 495 6d4cfd2-6d4d014 494->495 496 6d4d019-6d4d01c 494->496 495->496 499 6d4d065-6d4d068 496->499 500 6d4d01e-6d4d060 496->500 502 6d4d072-6d4d075 499->502 503 6d4d06a-6d4d06f 499->503 500->499 506 6d4d077-6d4d0b9 502->506 507 6d4d0be-6d4d0c1 502->507 503->502 506->507 510 6d4d0c3-6d4d0d2 507->510 511 6d4d10a-6d4d10d 507->511 514 6d4d0d4-6d4d0d9 510->514 515 6d4d0e1-6d4d0ed 510->515 518 6d4d404-6d4d410 511->518 519 6d4d113-6d4d116 511->519 514->515 524 6d4d935-6d4d96e 515->524 525 6d4d0f3-6d4d105 515->525 521 6d4d266-6d4d275 518->521 522 6d4d416-6d4d703 518->522 526 6d4d15f-6d4d162 519->526 527 6d4d118-6d4d15a 519->527 529 6d4d284-6d4d290 521->529 530 6d4d277-6d4d27c 521->530 702 6d4d709-6d4d70f 522->702 703 6d4d92a-6d4d934 522->703 547 6d4d970-6d4d973 524->547 525->511 531 6d4d164-6d4d166 526->531 532 6d4d171-6d4d174 526->532 527->526 529->524 538 6d4d296-6d4d2a8 529->538 530->529 542 6d4d401 531->542 543 6d4d16c 531->543 544 6d4d176-6d4d192 532->544 545 6d4d197-6d4d19a 532->545 566 6d4d2ad-6d4d2af 538->566 542->518 543->532 544->545 548 6d4d19c-6d4d19e 545->548 549 6d4d1a9-6d4d1ac 545->549 553 6d4d975-6d4d991 547->553 554 6d4d996-6d4d999 547->554 555 6d4d1a4 548->555 556 6d4d2bf-6d4d2c8 548->556 557 6d4d1f5-6d4d1f8 549->557 558 6d4d1ae-6d4d1f0 549->558 553->554 564 6d4d9a8-6d4d9ab 554->564 565 6d4d99b call 6d4da8d 554->565 555->549 567 6d4d2d7-6d4d2e3 556->567 568 6d4d2ca-6d4d2cf 556->568 569 6d4d241-6d4d244 557->569 570 6d4d1fa-6d4d23c 557->570 558->557 578 6d4d9ad-6d4d9d9 564->578 579 6d4d9de-6d4d9e0 564->579 586 6d4d9a1-6d4d9a3 565->586 576 6d4d2b6-6d4d2b9 566->576 577 6d4d2b1 566->577 580 6d4d3f4-6d4d3f9 567->580 581 6d4d2e9-6d4d2fd 567->581 568->567 583 6d4d246-6d4d25c 569->583 584 6d4d261-6d4d264 569->584 570->569 576->490 576->556 577->576 578->579 587 6d4d9e7-6d4d9ea 579->587 588 6d4d9e2 579->588 580->542 581->542 598 6d4d303-6d4d315 581->598 583->584 584->521 584->566 586->564 587->547 595 6d4d9ec-6d4d9fb 587->595 588->587 605 6d4da62-6d4da77 595->605 606 6d4d9fd-6d4da60 call 6d46570 595->606 612 6d4d317-6d4d31d 598->612 613 6d4d339-6d4d33b 598->613 619 6d4da78 605->619 606->605 615 6d4d321-6d4d32d 612->615 616 6d4d31f 612->616 618 6d4d345-6d4d351 613->618 623 6d4d32f-6d4d337 615->623 616->623 630 6d4d353-6d4d35d 618->630 631 6d4d35f 618->631 619->619 623->618 633 6d4d364-6d4d366 630->633 631->633 633->542 635 6d4d36c-6d4d388 call 6d46570 633->635 644 6d4d397-6d4d3a3 635->644 645 6d4d38a-6d4d38f 635->645 644->580 648 6d4d3a5-6d4d3f2 644->648 645->644 648->542 704 6d4d711-6d4d716 702->704 705 6d4d71e-6d4d727 702->705 704->705 705->524 706 6d4d72d-6d4d740 705->706 708 6d4d746-6d4d74c 706->708 709 6d4d91a-6d4d924 706->709 710 6d4d74e-6d4d753 708->710 711 6d4d75b-6d4d764 708->711 709->702 709->703 710->711 711->524 712 6d4d76a-6d4d78b 711->712 715 6d4d78d-6d4d792 712->715 716 6d4d79a-6d4d7a3 712->716 715->716 716->524 717 6d4d7a9-6d4d7c6 716->717 717->709 720 6d4d7cc-6d4d7d2 717->720 720->524 721 6d4d7d8-6d4d7f1 720->721 723 6d4d7f7-6d4d81e 721->723 724 6d4d90d-6d4d914 721->724 723->524 727 6d4d824-6d4d82e 723->727 724->709 724->720 727->524 728 6d4d834-6d4d84b 727->728 730 6d4d84d-6d4d858 728->730 731 6d4d85a-6d4d875 728->731 730->731 731->724 736 6d4d87b-6d4d894 call 6d46570 731->736 740 6d4d896-6d4d89b 736->740 741 6d4d8a3-6d4d8ac 736->741 740->741 741->524 742 6d4d8b2-6d4d906 741->742 742->724
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq
                                          • API String ID: 0-2086306503
                                          • Opcode ID: cdf81ad2372ed3451fd6fafb7b371676a399506970a41c1bcdaac036e76dc57a
                                          • Instruction ID: 5ad1132a6101f530bd61b1e1df5d548daff1e645f1928b9aa86ea45e97806079
                                          • Opcode Fuzzy Hash: cdf81ad2372ed3451fd6fafb7b371676a399506970a41c1bcdaac036e76dc57a
                                          • Instruction Fuzzy Hash: AD620074A002068FCB55EF68D690A5EB7F2FF84304B248679D4059F369DB79ED86CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 750 6d44b70-6d44b94 751 6d44b96-6d44b99 750->751 752 6d44b9f-6d44c97 751->752 753 6d45278-6d4527b 751->753 773 6d44c9d-6d44cea call 6d45419 752->773 774 6d44d1a-6d44d21 752->774 754 6d4529c-6d4529e 753->754 755 6d4527d-6d45297 753->755 756 6d452a5-6d452a8 754->756 757 6d452a0 754->757 755->754 756->751 759 6d452ae-6d452bb 756->759 757->756 787 6d44cf0-6d44d0c 773->787 775 6d44da5-6d44dae 774->775 776 6d44d27-6d44d97 774->776 775->759 793 6d44da2 776->793 794 6d44d99 776->794 790 6d44d17 787->790 791 6d44d0e 787->791 790->774 791->790 793->775 794->793
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fpq$XPpq$\Opq
                                          • API String ID: 0-2571271785
                                          • Opcode ID: 0f88b34a5cd4fb17178882a8ee21e41803253beebe53e276b136b9ac79c8e192
                                          • Instruction ID: 3ec235913415be4ddf676ae089ecdc7da6f1f0ba85cc56ec503389650d1c8f05
                                          • Opcode Fuzzy Hash: 0f88b34a5cd4fb17178882a8ee21e41803253beebe53e276b136b9ac79c8e192
                                          • Instruction Fuzzy Hash: 2C613170F002099FEB549FA5C9547AEBAF6FF88300F20852AD506AB395DF758C45CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1170 6d4a373-6d4a375 1171 6d4a377-6d4a3a0 1170->1171 1172 6d4a343-6d4a352 1170->1172 1173 6d4a3a2-6d4a3a5 1171->1173 1177 6d4a357-6d4a359 1172->1177 1175 6d4a4d8-6d4a4db 1173->1175 1176 6d4a3ab-6d4a3d8 call 6d42060 1173->1176 1178 6d4a4dd-6d4a4f6 1175->1178 1179 6d4a4fb-6d4a4fe 1175->1179 1218 6d4a4cd-6d4a4d7 1176->1218 1219 6d4a3de-6d4a402 1176->1219 1182 6d4a360-6d4a363 1177->1182 1183 6d4a35b 1177->1183 1178->1179 1180 6d4a504-6d4a59d call 6d42060 1179->1180 1181 6d4a5ae-6d4a5b1 1179->1181 1180->1176 1231 6d4a5a3-6d4a5ad 1180->1231 1185 6d4a5b3-6d4a5bd 1181->1185 1186 6d4a5be-6d4a5c1 1181->1186 1187 6d4a365-6d4a369 1182->1187 1188 6d4a2e8-6d4a2eb 1182->1188 1183->1182 1190 6d4a5c3-6d4a5d1 1186->1190 1191 6d4a5dc-6d4a5df 1186->1191 1193 6d4a30d-6d4a310 1188->1193 1194 6d4a2ed-6d4a308 1188->1194 1190->1180 1210 6d4a5d7 1190->1210 1196 6d4a5e1-6d4a600 1191->1196 1197 6d4a602-6d4a604 1191->1197 1198 6d4a332-6d4a335 1193->1198 1199 6d4a312-6d4a32d 1193->1199 1194->1193 1196->1197 1206 6d4a606 1197->1206 1207 6d4a60b-6d4a60e 1197->1207 1198->1177 1202 6d4a337 1198->1202 1199->1198 1202->1172 1206->1207 1207->1173 1212 6d4a614-6d4a61d 1207->1212 1210->1191 1226 6d4a404-6d4a40a 1219->1226 1227 6d4a40c 1219->1227 1229 6d4a412-6d4a4c7 call 6d46570 call 6d42060 1226->1229 1227->1229 1229->1218 1229->1219
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: X!@$x!@
                                          • API String ID: 0-2527372166
                                          • Opcode ID: df4384d1d75e757ca3858f917a6debc7e8bf8648137786e6aef8b2d19dfd5384
                                          • Instruction ID: 0fbcde79bd41287ac01e33db733b3e9b3b41ad7596d23942249758802bfc6406
                                          • Opcode Fuzzy Hash: df4384d1d75e757ca3858f917a6debc7e8bf8648137786e6aef8b2d19dfd5384
                                          • Instruction Fuzzy Hash: 8F718D71F102099FDB54EFA9D9806ADB7B2EB88310F148479E50AEB358EB35DC45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1249 6d490ff-6d49135 1251 6d49137-6d4913a 1249->1251 1252 6d49140-6d49155 1251->1252 1253 6d499f8-6d499fb 1251->1253 1259 6d49157-6d4915d 1252->1259 1260 6d4916d-6d49183 1252->1260 1254 6d49a21-6d49a23 1253->1254 1255 6d499fd-6d49a1c 1253->1255 1256 6d49a25 1254->1256 1257 6d49a2a-6d49a2d 1254->1257 1255->1254 1256->1257 1257->1251 1261 6d49a33-6d49a3d 1257->1261 1263 6d49161-6d49163 1259->1263 1264 6d4915f 1259->1264 1267 6d4918e-6d49190 1260->1267 1263->1260 1264->1260 1268 6d49192-6d49198 1267->1268 1269 6d491a8-6d49219 1267->1269 1270 6d4919c-6d4919e 1268->1270 1271 6d4919a 1268->1271 1280 6d49245-6d49261 1269->1280 1281 6d4921b-6d4923e 1269->1281 1270->1269 1271->1269 1286 6d49263-6d49286 1280->1286 1287 6d4928d-6d492a8 1280->1287 1281->1280 1286->1287 1292 6d492d3-6d492ee 1287->1292 1293 6d492aa-6d492cc 1287->1293 1298 6d492f0-6d4930c 1292->1298 1299 6d49313-6d49321 1292->1299 1293->1292 1298->1299 1300 6d49331-6d493ab 1299->1300 1301 6d49323-6d4932c 1299->1301 1307 6d493ad-6d493cb 1300->1307 1308 6d493f8-6d4940d 1300->1308 1301->1261 1312 6d493e7-6d493f6 1307->1312 1313 6d493cd-6d493dc 1307->1313 1308->1253 1312->1307 1312->1308 1313->1312
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq
                                          • API String ID: 0-3550614674
                                          • Opcode ID: 228b61c4fb1ab3158654573ea4d900246a93a2025e3998d7b49f5dcf476e40ff
                                          • Instruction ID: 5e30af3d26b2745c6aa109d09eea4da1866f0a8500358812bf8cb4848998850a
                                          • Opcode Fuzzy Hash: 228b61c4fb1ab3158654573ea4d900246a93a2025e3998d7b49f5dcf476e40ff
                                          • Instruction Fuzzy Hash: 10515E70F105068FDB64DF75D960BAF73F6EB88640F508869C40AEB399EA78DC118B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1316 14a8168-14a816a 1317 14a816e-14a81ba 1316->1317 1318 14a816c 1316->1318 1321 14a81bc-14a81bf 1317->1321 1322 14a81c2-14a81ed DeleteFileW 1317->1322 1318->1317 1321->1322 1323 14a81ef-14a81f5 1322->1323 1324 14a81f6-14a821e 1322->1324 1323->1324
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 014A81E0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2928547371.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_14a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 0a82ce147e19dca890aa35385d36fde7d4941a5444b5d270eb7a072c6b3ebefe
                                          • Instruction ID: 05302a55ca551df8f00fc8be9e330272e737986c351cfdd33026cfd44ea70ac3
                                          • Opcode Fuzzy Hash: 0a82ce147e19dca890aa35385d36fde7d4941a5444b5d270eb7a072c6b3ebefe
                                          • Instruction Fuzzy Hash: 532134B1C0065A9BCB24CF9AC444BDEFBB4FB48320F11812AE858B7751D778A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1327 14a8170-14a81ba 1329 14a81bc-14a81bf 1327->1329 1330 14a81c2-14a81ed DeleteFileW 1327->1330 1329->1330 1331 14a81ef-14a81f5 1330->1331 1332 14a81f6-14a821e 1330->1332 1331->1332
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 014A81E0
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2928547371.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_14a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 78450e4e4f4ff1f495d74379f94851bd0395439fe6cf6ba6fd4b914ec0e8d16f
                                          • Instruction ID: ec5eff738879f2c89528f2892d35e876a2c7a9f1ce6fe539c4512b77757b27c3
                                          • Opcode Fuzzy Hash: 78450e4e4f4ff1f495d74379f94851bd0395439fe6cf6ba6fd4b914ec0e8d16f
                                          • Instruction Fuzzy Hash: 361133B1C0061A9BCB14CF9AC444BAEFBB4FB48320F11812AD858B7351D738A940CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1335 14af0f0-14af164 GlobalMemoryStatusEx 1337 14af16d-14af195 1335->1337 1338 14af166-14af16c 1335->1338 1338->1337
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 014AF157
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2928547371.00000000014A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_14a0000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 85cb19143cb294bbbdd593b2964173b444c22e4b2af0377e8ca4814c394c1747
                                          • Instruction ID: 2dd15ebf201c6fe92a7e8e49ab8b6467dd0793cc18e2262ede721e6d55da439f
                                          • Opcode Fuzzy Hash: 85cb19143cb294bbbdd593b2964173b444c22e4b2af0377e8ca4814c394c1747
                                          • Instruction Fuzzy Hash: 50111FB1C002699BCB10CFAAC444BDEFBF4AB48320F11816AD818B7251D378A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPpq
                                          • API String ID: 0-1266478781
                                          • Opcode ID: 323584450fc470cd6631639ba7820d63899230ecd589b51a69f105ee5b8a57cd
                                          • Instruction ID: ebaa040b14f591dec79a6bdcb18747000f1b873a589ddbf400755259d8b9efff
                                          • Opcode Fuzzy Hash: 323584450fc470cd6631639ba7820d63899230ecd589b51a69f105ee5b8a57cd
                                          • Instruction Fuzzy Hash: F4416270F002099FDB54DFA9C954B9EBAF6FF88300F20852AE505AB3A5DB758C41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: c60deb469f081d7a072b0bc40af23f4923dbd408b35b6eb6cdce23cc0dec88a6
                                          • Instruction ID: 4edf4b4fcd6cd20db91dece33e903a8443fe1cb6682be714be09e52f1e05578f
                                          • Opcode Fuzzy Hash: c60deb469f081d7a072b0bc40af23f4923dbd408b35b6eb6cdce23cc0dec88a6
                                          • Instruction Fuzzy Hash: B9419D70E0020A9FDB65AF65C58469EBBB6FF85300F20852AE406EB354DB75DC46CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: 3c4d8769b0d5320228c28f66ee6a0880f68545533f219e1c59ca164b0d8e0a65
                                          • Instruction ID: 5c7eff8e022d95a5904bbb3e78bb2f987b80796dd7d77ffffec11fe1438e18b7
                                          • Opcode Fuzzy Hash: 3c4d8769b0d5320228c28f66ee6a0880f68545533f219e1c59ca164b0d8e0a65
                                          • Instruction Fuzzy Hash: 1131DE70B102058FCB69AB78D65466F7AE6AB89340F20443CE406EB399DF39DE41C790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq
                                          • API String ID: 0-3037731980
                                          • Opcode ID: 482dd299f433c6c225e07e5cadfa794a6921a4b481d5c53652776c69dd782918
                                          • Instruction ID: 64bd6b3d216497bce2b1a2c6d1c0286df7b902e3c046f431219b3a2e79bca1f5
                                          • Opcode Fuzzy Hash: 482dd299f433c6c225e07e5cadfa794a6921a4b481d5c53652776c69dd782918
                                          • Instruction Fuzzy Hash: 21F0A936F00641CFEF74AF48EA843B973B0EB516D6F1800B2DA01E7151DA38DE05E650
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \Opq
                                          • API String ID: 0-3546586535
                                          • Opcode ID: 45a259e0ba93c08425c345fec18b2db5b2c533e6fe59b3bd388b19b2bf2402d2
                                          • Instruction ID: 1e811f38669c07cfab52d46f12b24fc229c551f81b3a7983940d6eb385f6ac6e
                                          • Opcode Fuzzy Hash: 45a259e0ba93c08425c345fec18b2db5b2c533e6fe59b3bd388b19b2bf2402d2
                                          • Instruction Fuzzy Hash: 29F0FE70A14229DFDB14EF94E859BADBBB2FF44704F244129E502A7294CB745C45CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d5159d9825326a259571422d868906d2b949234ba805357814c998181be704c
                                          • Instruction ID: fde55707562572604154801c94a0fbb34186877a630244e43e1e6acefea3ea0b
                                          • Opcode Fuzzy Hash: 5d5159d9825326a259571422d868906d2b949234ba805357814c998181be704c
                                          • Instruction Fuzzy Hash: 1D325E74F112059FDB64EF68D680BAEB7B2EB88310F108529E505EB395DB39EC45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b56416292cd35e3427f987821b15d1fe15a7f74d26f759ecdacdb7fd7a9ed378
                                          • Instruction ID: a4cfe50f0d50a009907aac91365e2013bea7e924ff2d7a4cc4d0f82336ec53ce
                                          • Opcode Fuzzy Hash: b56416292cd35e3427f987821b15d1fe15a7f74d26f759ecdacdb7fd7a9ed378
                                          • Instruction Fuzzy Hash: C561B2B1F001214BCF65AB7EC88066EBAEBAFD5610B154439E80BDB375DE69DC0287C1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d9a9b92d8b204b9cf660da2e6c0105cbcb008efb646696f5cbf51098019255c8
                                          • Instruction ID: bc0eac18b2eaf9ab799f6eb008de029c5dc9c755a33e298dc0128ab2f56efa60
                                          • Opcode Fuzzy Hash: d9a9b92d8b204b9cf660da2e6c0105cbcb008efb646696f5cbf51098019255c8
                                          • Instruction Fuzzy Hash: 87812E70B006058BDF54DFA9D5947AEB7F6EF88700F108829E50AEB395EB74DC828B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b3e53285f0c17ee3daa3c204f268e18d0214e911c0b2c4b7bef805b074b18ea
                                          • Instruction ID: 48d19876097fce12ab273a2e091fcdea5dd0107e6e7b036b48870c395acd0796
                                          • Opcode Fuzzy Hash: 1b3e53285f0c17ee3daa3c204f268e18d0214e911c0b2c4b7bef805b074b18ea
                                          • Instruction Fuzzy Hash: FD913C74E106198BDF60DF68C880B9DB7B1FF89310F208699D549BB295DB70AD85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 24acf91d2f8fa2673543a1f5195a28379b2834fbcacd1a1239a3b6360e1299e5
                                          • Instruction ID: 525e482b44f8d5e34112a3548091fbe03bb4b65eb6428b139cadfe8eee23b7e6
                                          • Opcode Fuzzy Hash: 24acf91d2f8fa2673543a1f5195a28379b2834fbcacd1a1239a3b6360e1299e5
                                          • Instruction Fuzzy Hash: AD913A74E1061A8BDF60DF68C880B9DB7B1FF89310F208599D549BB294DB70AE85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6ca6f890f04b9be245deaf0b45c5e5808d796f2730488bacaafa682fd0e11c1
                                          • Instruction ID: 5cefe6ab48d913561db62f62b2058c9d3de78320285c8d38984a649cac588aff
                                          • Opcode Fuzzy Hash: c6ca6f890f04b9be245deaf0b45c5e5808d796f2730488bacaafa682fd0e11c1
                                          • Instruction Fuzzy Hash: E0713B70A002099FCB54EFA9D980AADBBF6FF84300F148529D409EB364DB34EC46CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f29dae09e64fa7c5208e4f0473cb854978139876454547b15fdfe06f516a800
                                          • Instruction ID: efab96b0ba93381aae1470a71e13bf76b37048e3c64750d37b978b26c374cff2
                                          • Opcode Fuzzy Hash: 9f29dae09e64fa7c5208e4f0473cb854978139876454547b15fdfe06f516a800
                                          • Instruction Fuzzy Hash: 28711C70A002099FDB54EFA9D980A9EBBF6FF88304F148469D409EB365DB34EC45CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 488bf6973e6213416acc318efb5350c95a8ae374985837b9136250adc59b88d8
                                          • Instruction ID: 5be58a0db46edd0b1080a115af03b5a2da99023d61c3b498227ec6f2f9904b0e
                                          • Opcode Fuzzy Hash: 488bf6973e6213416acc318efb5350c95a8ae374985837b9136250adc59b88d8
                                          • Instruction Fuzzy Hash: D751AD71E00105DFCB64AFB8E5846AEBBB2EBC4315F208879E106E7264DB358D55CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94540a59b0e976e65790db0827cec63c3ba244412caaf686a7df0120d3e6d6fd
                                          • Instruction ID: 637eb2e32c89adc06c6649f3d6523069815d80e77439f270bdd79f9021686f68
                                          • Opcode Fuzzy Hash: 94540a59b0e976e65790db0827cec63c3ba244412caaf686a7df0120d3e6d6fd
                                          • Instruction Fuzzy Hash: 6951C774B102148FEFA06B7CD994B6F265AE7C9750F10483AE50AE73F4C92DCC4547A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f96c5422f0ba36bc4d57549cefe82a4d8cf56b0dc7f79ab6300d4c5eef564c8d
                                          • Instruction ID: 8dfd56eeab1f9e8260c9209e8d312804aa7a19654154fc31a305786bd3c7b9b1
                                          • Opcode Fuzzy Hash: f96c5422f0ba36bc4d57549cefe82a4d8cf56b0dc7f79ab6300d4c5eef564c8d
                                          • Instruction Fuzzy Hash: F651B9B4B102048FEFA46BBCD994B2F265AD7C9350F10483AE50AE73B4C96DCC4547A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a571e80182b142032dae55621a063eaa8f0b23164b37621ec7a775870fad01c1
                                          • Instruction ID: 203eb04e88cf8d225eb8be74bea9703651a1c77ce76b5113816ec0101be6021e
                                          • Opcode Fuzzy Hash: a571e80182b142032dae55621a063eaa8f0b23164b37621ec7a775870fad01c1
                                          • Instruction Fuzzy Hash: 84517F74E1011A9BDF64EB68D480A7EFBB2FB45310F248A26E456DB681C634EC91CBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b20477d09a29fb9073531cd875c29e22b8c7b64bcea7064715675c8b6b2e509f
                                          • Instruction ID: d667b56ab80e6d91f4127fc762c462d20f1381990b6c95a29abb64a7e79a22e8
                                          • Opcode Fuzzy Hash: b20477d09a29fb9073531cd875c29e22b8c7b64bcea7064715675c8b6b2e509f
                                          • Instruction Fuzzy Hash: B0416D71E006099FDB60DFA9E881ABFFBB2EB45210F10492AE15ADB654D330EC55CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e971e9f4521aa1a63ae06f381d841c609905c75d641bc60ed5ea9c737a6362d
                                          • Instruction ID: 3b713a89d4129b90c669cf1a8dbafb3ccea9e83976490726dc6aa34a43c47e22
                                          • Opcode Fuzzy Hash: 4e971e9f4521aa1a63ae06f381d841c609905c75d641bc60ed5ea9c737a6362d
                                          • Instruction Fuzzy Hash: E031C170E0020A9BCB55DF65D894A9EB7F2EF89300F108429F906E7350DB35ED41CB40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3bf3a841f3eb84ee32f0347a0eb84c372b6b11ad59e3052df37c5f094948b993
                                          • Instruction ID: 90978da35a1797034929df417f0b2a7192288a1adcc955b9098223e1d2ca2a48
                                          • Opcode Fuzzy Hash: 3bf3a841f3eb84ee32f0347a0eb84c372b6b11ad59e3052df37c5f094948b993
                                          • Instruction Fuzzy Hash: E531D270E1020A9FCF24EF69C990A9EBBB6EF85300F104529E401E7354EB75ED45CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c75658a29fd41ca89c2f2f0a09ab2e37a26a210030fad8f808b57de5165d08dd
                                          • Instruction ID: bdb8d52179a34d86ae6edc7fd948c89791ce14d8c23a6c8f7286d18293208c68
                                          • Opcode Fuzzy Hash: c75658a29fd41ca89c2f2f0a09ab2e37a26a210030fad8f808b57de5165d08dd
                                          • Instruction Fuzzy Hash: B9317CB1D05259AFCB10DFA9D881BDEFBB8FB09350F10816AE449E7241D3759940CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5eba0049eb499ecaa139e99e5bb3faeaaab0a341ca1c8bb8b9ec02647ab391d1
                                          • Instruction ID: 7fbb00495fa6f899daa89af2ecba7d23b43f0a7876217520a45d3fd74e0da6cf
                                          • Opcode Fuzzy Hash: 5eba0049eb499ecaa139e99e5bb3faeaaab0a341ca1c8bb8b9ec02647ab391d1
                                          • Instruction Fuzzy Hash: D2317A70E1060A9BCB14DF65D994AAEB7F2EF89300F108929F906E7390DB75ED41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b86826746e76822a61d01f7e924c6889bb7357a213d7d4d286a2fabb31c8eb02
                                          • Instruction ID: 55d8adb6ef7d05ee316baaed4f8ed228ce444975b7074ae8708cadb07a0a1568
                                          • Opcode Fuzzy Hash: b86826746e76822a61d01f7e924c6889bb7357a213d7d4d286a2fabb31c8eb02
                                          • Instruction Fuzzy Hash: 51218B75F112059FDB50DF7AD980AEEBBF5EB48610F11842AE905EB3A1E738DC418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: edf66a573f671c67b0559a9ffd435826e5b58db0c303183dd6194b00c642cc63
                                          • Instruction ID: 46f3c8b11623330446dfbfa79761bc215a2ae73d7c5acdbd95994d556d8d3c47
                                          • Opcode Fuzzy Hash: edf66a573f671c67b0559a9ffd435826e5b58db0c303183dd6194b00c642cc63
                                          • Instruction Fuzzy Hash: 4F312B7150D3C09FC703CB64D994611BF71AB47214F29C5EBD8898F2A3C27A980ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c533db03ec5cb85b38c30aa4633c4da71f80870dbdbae8d6ce4601483fe637d
                                          • Instruction ID: 548ba8d24c8d20b652f4baa949b0c4194b4472d7b4dce85a983b2c0cb5f07c18
                                          • Opcode Fuzzy Hash: 4c533db03ec5cb85b38c30aa4633c4da71f80870dbdbae8d6ce4601483fe637d
                                          • Instruction Fuzzy Hash: 23217A75F116159FDB50DF6AD980AAEBBF1EB88610F11843AE905E73A0E738DC41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 71c85c5a46034dc6a446e03c2e4080f842dd304985c2fc289eff2c2df931dfc7
                                          • Instruction ID: f8e971da43b59074b0e652e9b3f58e505e3ca42c7d67299882108cdbec1612a9
                                          • Opcode Fuzzy Hash: 71c85c5a46034dc6a446e03c2e4080f842dd304985c2fc289eff2c2df931dfc7
                                          • Instruction Fuzzy Hash: C82103B1904204DFCB16DF99C984B26BB65EB84318F20C57AE94D4B3A6C736D44BCA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b996cd56fcff0baf4bf041a08db92e0605426bd9cf3bac6d9f1f356fd2227cfe
                                          • Instruction ID: ea60217e3700980142e821f430cb5dd3e6b0a8876640a30c741c0ea3298de467
                                          • Opcode Fuzzy Hash: b996cd56fcff0baf4bf041a08db92e0605426bd9cf3bac6d9f1f356fd2227cfe
                                          • Instruction Fuzzy Hash: F2210471904244DFDB02DF99D584B2BBB65FB84334F20C67ED8494B3A6C37AD44ACA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa474603f03533c411ac9ada861dbab7cf8bade5e24be9702b73ecf1ca1e12f4
                                          • Instruction ID: 2ef0a03351cea6526adbe9f6bc8bc8d968af16dd2f91c5cfc1c183e80e76f42c
                                          • Opcode Fuzzy Hash: fa474603f03533c411ac9ada861dbab7cf8bade5e24be9702b73ecf1ca1e12f4
                                          • Instruction Fuzzy Hash: 2521F271904204DFDB06DF99D9C4B26BBA5FB84314F20C57ED90A4B3A6C376E44ACA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 240a849394413faccad41ef7282855dbcfca2df6dd5079b14197fdc7db3bb747
                                          • Instruction ID: 5a37d68e43abb56ae2ff8e07bb3273e21643450b3531bc990147f0b43e2d6d34
                                          • Opcode Fuzzy Hash: 240a849394413faccad41ef7282855dbcfca2df6dd5079b14197fdc7db3bb747
                                          • Instruction Fuzzy Hash: CD21A171E002289BCB54AB6AD8405DEB7F5EB89310F154469E10AE7204DA329D40CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3eb723ba5568c82714db725767a047bb1fcf8bed010395116852d1783118dafb
                                          • Instruction ID: d1f1406b4fe01c8ba5538db495d9fbb8c2bde4125798a6a96efa625ac7bf48ac
                                          • Opcode Fuzzy Hash: 3eb723ba5568c82714db725767a047bb1fcf8bed010395116852d1783118dafb
                                          • Instruction Fuzzy Hash: 7111C460B202256BEF643B7D8D5472F268EC7DA750F25483BE10AE73B5C85ACC4243E2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6457caa013caf7bb609b4b694e145766db5bf2bdf8df65ac36a6cc283197f350
                                          • Instruction ID: 196931e4686153f08a5adc025b74b14600bff1bea50303d6cb0044466691f9a7
                                          • Opcode Fuzzy Hash: 6457caa013caf7bb609b4b694e145766db5bf2bdf8df65ac36a6cc283197f350
                                          • Instruction Fuzzy Hash: 3921D371944240DFDB06DF99C984B26BB65EB84314F20C67ED9094E3A6C736D44AC661
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eeb8a20c1c3ab849cb3f25da06183697acf83b4a6f6f68e3bf1a0b37af4c005d
                                          • Instruction ID: 6aabbc8cb56a6afcae95db24bfff4389954b16be0ed1174a1f4cfae99e3b53c4
                                          • Opcode Fuzzy Hash: eeb8a20c1c3ab849cb3f25da06183697acf83b4a6f6f68e3bf1a0b37af4c005d
                                          • Instruction Fuzzy Hash: EF11C271B401241FCB61ABBDE890BAAB7A6EB85650F188479E10AD7244EA1ADC018791
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fd25bacf1bfde94fcdf7998365a4659e68218f2469380a3f0c241074ec8a110
                                          • Instruction ID: bcd563490f6a3b47fc16c306b1f05fb5b6c598669665e1a612c3a43f466819cf
                                          • Opcode Fuzzy Hash: 7fd25bacf1bfde94fcdf7998365a4659e68218f2469380a3f0c241074ec8a110
                                          • Instruction Fuzzy Hash: A7018460B20225ABEF643B6D895472F658EC7D9750F21483AE50EE73B4C96BCC8103E2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b7fe6161514ea1694ee3cebf0486e3ad17e05e6e8738a1aa699e5f7b8bf0c99
                                          • Instruction ID: 947395573235b887090d49001d1cf1432e75ff2ddfb6e7b55abf3f1408772aad
                                          • Opcode Fuzzy Hash: 9b7fe6161514ea1694ee3cebf0486e3ad17e05e6e8738a1aa699e5f7b8bf0c99
                                          • Instruction Fuzzy Hash: D911D630B001210FC764AA7D989075BB7DBDBC6A10F20882AE14AD7791DE25CC464391
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4b777245e2c733ef744a6cc80d11982168925ef1fde74e4343a0f78235ebc06a
                                          • Instruction ID: bb7e508ffffb9df835cb5407d2109a91967af7c9168f37e7e303f79f88a1b3ce
                                          • Opcode Fuzzy Hash: 4b777245e2c733ef744a6cc80d11982168925ef1fde74e4343a0f78235ebc06a
                                          • Instruction Fuzzy Hash: A211A131B101244FDF64AA6DC8146AE73FAEBC8650B008539D506E7354EF79DC118BD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 606eeff3585cb9c80494cc1a7ae34225c6c5bd1c4f03bce9c90da5636b3504e9
                                          • Instruction ID: 10f565eebcd8a73a64633b9d47dfa508a648e4ff58458b439e5ee4bac8c1f123
                                          • Opcode Fuzzy Hash: 606eeff3585cb9c80494cc1a7ae34225c6c5bd1c4f03bce9c90da5636b3504e9
                                          • Instruction Fuzzy Hash: 8021C3B5D01219AFCB00DF9AD884ACEFBB8FB48314F10812AE918A7201C375A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b297b85c4874bb1ea9f2e295afb5e11a1815341f32ac5c887cd97a52fd0ac90
                                          • Instruction ID: ab5f3c0ffb6a98e92ac237579f33c98c4323e6c86734b4dc42209e1fe19ca5f7
                                          • Opcode Fuzzy Hash: 7b297b85c4874bb1ea9f2e295afb5e11a1815341f32ac5c887cd97a52fd0ac90
                                          • Instruction Fuzzy Hash: 8F01F7B5B001510FDB65AB3DD96073A67D7DBC9650F10883AE10BC7390EA25DC024791
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d7aad46ccfec6cd243779f6864d8b48f2714f420d327d4d037a7383850864333
                                          • Instruction ID: c5d8dbd7fca530ce6724ef9929d505683c5eeadefa563d7d6005dae165d52cc1
                                          • Opcode Fuzzy Hash: d7aad46ccfec6cd243779f6864d8b48f2714f420d327d4d037a7383850864333
                                          • Instruction Fuzzy Hash: AD01B136B101141BDF689A6ECC246EF76FEEBC8650F044039E506E7344EE658C1287D1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cde69fb094673f96fb17e158aaca7af1020bc6971be9f53f9575951aa883aadb
                                          • Instruction ID: ab1e4e0af2f5d3fbc6974a413400cc7297ad0b4fa1f6f9f850c3e5c4265c4eda
                                          • Opcode Fuzzy Hash: cde69fb094673f96fb17e158aaca7af1020bc6971be9f53f9575951aa883aadb
                                          • Instruction Fuzzy Hash: DA21CEB1D01259AFCB10DF9AD884ADEFBB4FB48324F10812AE918B7241C374A954CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                          • Instruction ID: 7d6cd426508758fbdf2157c36bc821a99bcf46fbb7b549e794a33906e5fe486a
                                          • Opcode Fuzzy Hash: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                          • Instruction Fuzzy Hash: C4119075904284CFDB12CF94D5C4B56BF61FB84324F24C6AED8494B796C33AD41ACB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 6dd5d4074a1b7dd695d361c10b9ee719a5d0dfc87e573b9ab3f0ef2043b1e3e4
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: 70118E75904240DFDB06CF54D5C4B56BF61FB44214F24C6BAD8494B7A6C33AE44ACF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2927935860.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_140d000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                          • Instruction ID: 3b57461814e244c67f381d39db9722c8d5c0301fee782e02e0df506c992af800
                                          • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                          • Instruction Fuzzy Hash: 10118E75904280CFDB16CF58D5C4B16BF62FB44214F24C6AAD8494B7A6C33AD44ACB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d192190b3c2b27640830ae34829291236e46b4fc08fc49472a02417d8a5eb0a2
                                          • Instruction ID: 84ff6ff1b3bb3211e5cd52863b888ef7b50fa50e0ae5deeaaa88d4093eb5e6e2
                                          • Opcode Fuzzy Hash: d192190b3c2b27640830ae34829291236e46b4fc08fc49472a02417d8a5eb0a2
                                          • Instruction Fuzzy Hash: 5801A431B000210BDB74ABBE9594B2FB7DBDBC9B20F108839E60AC7784EE65DC424395
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a66d157d7371bfc414787d3c31fd186a4adcfc19a8ee471c427fe2a3a187010
                                          • Instruction ID: 57a8331a46b54ca15de6a5bf475ae73240f426d712ba8f53471996f7d2b350a2
                                          • Opcode Fuzzy Hash: 0a66d157d7371bfc414787d3c31fd186a4adcfc19a8ee471c427fe2a3a187010
                                          • Instruction Fuzzy Hash: 9901A4B5B100110BDB64AB3DD960B3F62D7DBC9660F10883AE20AC7390EE65DC0247C1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e63d72df92648ff9757bc98b3daa7d8203226bb413288548feee9531eed1a16
                                          • Instruction ID: 6e5cac1ba2fffbfafa1062c236e810aa025b0ed630e12ca0d081df8a151834b2
                                          • Opcode Fuzzy Hash: 2e63d72df92648ff9757bc98b3daa7d8203226bb413288548feee9531eed1a16
                                          • Instruction Fuzzy Hash: 1F01A470B105254FDB60EBBDE594B2FB3D6E789710F148838E20AC7358EA2AEC018785
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b4d9eb7956b56305ecc7b6579c057d40b8f4b4b6263a92a2fdc061daca3ab119
                                          • Instruction ID: 15a01f312737066fbacc94360499a29cc438e1d9bd62759f988dd5abe39ae7ac
                                          • Opcode Fuzzy Hash: b4d9eb7956b56305ecc7b6579c057d40b8f4b4b6263a92a2fdc061daca3ab119
                                          • Instruction Fuzzy Hash: 0EF02479E22224ABCB64BE79DC005DAB776FBC0360F114039E951B7340DA36AC04C7D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c73cae4e1e6f5e3ea30c84193e0472f5935c7893593207d2a1c369b0b4f4869b
                                          • Instruction ID: 0bc0a29cc61ed5d4fd63273335be2225d5e6b9e277cb864227f40c1ae2b03bcd
                                          • Opcode Fuzzy Hash: c73cae4e1e6f5e3ea30c84193e0472f5935c7893593207d2a1c369b0b4f4869b
                                          • Instruction Fuzzy Hash: 07D02220325AE002F702B29CA810BE92F8C834B315F0040AAE80883692CEEA080503CA
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ee3f8bedd354f0dc90160dc08d97c409235907b3807a23b5c203eb65b510ecc
                                          • Instruction ID: efb287b004d31c99e5a3c91f2fea26cca4b30461938fea5d4efe677bfea42612
                                          • Opcode Fuzzy Hash: 4ee3f8bedd354f0dc90160dc08d97c409235907b3807a23b5c203eb65b510ecc
                                          • Instruction Fuzzy Hash: 44B09B2172457513D90471DD641059D728D4789564F004077A50D877854DD55C4102DA
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1324371161
                                          • Opcode ID: 54f9d8260906be8ee84bcb68e49b9fa5f56b367b56190505df944468cb02e58b
                                          • Instruction ID: 5e18faf2724fd7584ee60ed5569529ab2cee64febafd17a10f1b95e2cf9ba041
                                          • Opcode Fuzzy Hash: 54f9d8260906be8ee84bcb68e49b9fa5f56b367b56190505df944468cb02e58b
                                          • Instruction Fuzzy Hash: B8121A70E006198FDB64EF69C954A9EB7B2FF88300F208569D40AAB365DB35DD85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1078448309
                                          • Opcode ID: 50b3d7741fae99d7c4ecaa0e3f5e2bbc3c993226f1e83f2d61217f22fa037fd0
                                          • Instruction ID: 978df9bec14cfd8ee9466f6648cc0aef3940c9eded8e73fc2a84c98d71f8a208
                                          • Opcode Fuzzy Hash: 50b3d7741fae99d7c4ecaa0e3f5e2bbc3c993226f1e83f2d61217f22fa037fd0
                                          • Instruction Fuzzy Hash: F8917070A40209DFEB64EF65D655B6E77B6EF84300F188529E442AB398DB399C41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: 30b20a7da32de314cfe1cc55f9f839b4076ff5d74bbcc363eee2a8aff4481ea0
                                          • Instruction ID: 0ade5ee9181aa2dbcd9264b7aa9d9e806a069f29c05a9ace2cc1fbe2e459b460
                                          • Opcode Fuzzy Hash: 30b20a7da32de314cfe1cc55f9f839b4076ff5d74bbcc363eee2a8aff4481ea0
                                          • Instruction Fuzzy Hash: 07F13D74B00209CFDB54EF69C554A6EB7B2FF94300F248569D405AB3A9DB79EC82CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: 5fe4e5ce0d36fa5882778abcda6dcbe155374b3e729f6a6eaaeb5601a5346dd9
                                          • Instruction ID: 7b96654f7368cab59365440455abae03c345f41108bf7482d2522d8682e07970
                                          • Opcode Fuzzy Hash: 5fe4e5ce0d36fa5882778abcda6dcbe155374b3e729f6a6eaaeb5601a5346dd9
                                          • Instruction Fuzzy Hash: BFB12D70F102098FDB64EF69D5506AEB7B2FF94340F248929D406AB3A5DB75DC82DB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: 8998a89be88c734dcf117f429e65fb8d621d85feb261a41517b74e8fec027a2a
                                          • Instruction ID: bf302fb672d6a82666980c2d5deed4c6487508cdd71b69926dee9d26268f7513
                                          • Opcode Fuzzy Hash: 8998a89be88c734dcf117f429e65fb8d621d85feb261a41517b74e8fec027a2a
                                          • Instruction Fuzzy Hash: B0519174F502059FDF64EB68D5806AEB3B2EB84311F18893AE815E7358DB39DC41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2968629468.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_6d40000_BKG#SGN2106728.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRkq$LRkq$$kq$$kq
                                          • API String ID: 0-2392252538
                                          • Opcode ID: 4bb33f7dc6c3b21f18c76c49dc92b6737fcd0c8146ea60fc5a01ed8249d36fa9
                                          • Instruction ID: c01335ff22163dfb6a8c5e321b0fdb14e490d536c72b3bceb6a74bda0a9c637f
                                          • Opcode Fuzzy Hash: 4bb33f7dc6c3b21f18c76c49dc92b6737fcd0c8146ea60fc5a01ed8249d36fa9
                                          • Instruction Fuzzy Hash: D351E530B002018FDB54EF68D990A6AB7F2FF88340F14856DE412AB3A5DB39EC40CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:10.9%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:171
                                          Total number of Limit Nodes:11
                                          execution_graph 28807 10a0fd8 28808 10a1023 ReadProcessMemory 28807->28808 28810 10a1067 28808->28810 28805 104fc80 DuplicateHandle 28806 104fd16 28805->28806 28994 104d2b0 28995 104d2bf 28994->28995 28997 104d397 28994->28997 28998 104d3b9 28997->28998 28999 104d3dc 28997->28999 28998->28999 29005 104d630 28998->29005 29009 104d640 28998->29009 28999->28995 29000 104d3d4 29000->28999 29001 104d5e0 GetModuleHandleW 29000->29001 29002 104d60d 29001->29002 29002->28995 29007 104d640 29005->29007 29006 104d679 29006->29000 29007->29006 29013 104c768 29007->29013 29010 104d654 29009->29010 29011 104c768 LoadLibraryExW 29010->29011 29012 104d679 29010->29012 29011->29012 29012->29000 29014 104d820 LoadLibraryExW 29013->29014 29016 104d899 29014->29016 29016->29006 28811 10a1662 28812 10a158c 28811->28812 28813 10a1620 28811->28813 28812->28813 28816 10a36b8 28812->28816 28832 10a36c8 28812->28832 28817 10a36c8 28816->28817 28818 10a36ea 28817->28818 28848 10a3b2e 28817->28848 28854 10a4137 28817->28854 28859 10a4091 28817->28859 28864 10a3d30 28817->28864 28869 10a4153 28817->28869 28873 10a42bc 28817->28873 28878 10a3ebc 28817->28878 28883 10a3ddb 28817->28883 28888 10a395a 28817->28888 28895 10a3f85 28817->28895 28900 10a39c5 28817->28900 28906 10a3e26 28817->28906 28911 10a418c 28817->28911 28818->28812 28833 10a36e2 28832->28833 28834 10a36ea 28833->28834 28835 10a3b2e 2 API calls 28833->28835 28836 10a418c 2 API calls 28833->28836 28837 10a3e26 2 API calls 28833->28837 28838 10a39c5 2 API calls 28833->28838 28839 10a3f85 2 API calls 28833->28839 28840 10a395a 2 API calls 28833->28840 28841 10a3ddb 2 API calls 28833->28841 28842 10a3ebc 2 API calls 28833->28842 28843 10a42bc 2 API calls 28833->28843 28844 10a4153 2 API calls 28833->28844 28845 10a3d30 2 API calls 28833->28845 28846 10a4091 2 API calls 28833->28846 28847 10a4137 2 API calls 28833->28847 28834->28812 28835->28834 28836->28834 28837->28834 28838->28834 28839->28834 28840->28834 28841->28834 28842->28834 28843->28834 28844->28834 28845->28834 28846->28834 28847->28834 28849 10a3b49 28848->28849 28850 10a3a85 28848->28850 28849->28818 28850->28849 28916 10a1170 28850->28916 28920 10a1165 28850->28920 28855 10a3df2 28854->28855 28856 10a3e07 28854->28856 28924 10a0868 28855->28924 28928 10a0860 28855->28928 28860 10a4096 28859->28860 28932 10a46c8 28860->28932 28937 10a46b7 28860->28937 28861 10a3bc7 28865 10a3d53 28864->28865 28950 10a0ee8 28865->28950 28954 10a0ee0 28865->28954 28866 10a3d74 28871 10a0d49 Wow64SetThreadContext 28869->28871 28872 10a0d50 Wow64SetThreadContext 28869->28872 28870 10a416d 28871->28870 28872->28870 28874 10a42df 28873->28874 28876 10a0ee8 WriteProcessMemory 28874->28876 28877 10a0ee0 WriteProcessMemory 28874->28877 28875 10a4461 28876->28875 28877->28875 28879 10a3e47 28878->28879 28880 10a3ec3 28878->28880 28958 10a0e28 28879->28958 28962 10a0e20 28879->28962 28884 10a3de1 28883->28884 28886 10a0868 ResumeThread 28884->28886 28887 10a0860 ResumeThread 28884->28887 28885 10a3e07 28886->28885 28887->28885 28889 10a3972 28888->28889 28891 10a39c9 28888->28891 28889->28818 28890 10a3b49 28890->28818 28891->28890 28893 10a1170 CreateProcessA 28891->28893 28894 10a1165 CreateProcessA 28891->28894 28892 10a3ba2 28892->28818 28893->28892 28894->28892 28896 10a3d53 28895->28896 28897 10a3d74 28896->28897 28898 10a0ee8 WriteProcessMemory 28896->28898 28899 10a0ee0 WriteProcessMemory 28896->28899 28898->28897 28899->28897 28902 10a39c9 28900->28902 28901 10a3b49 28901->28818 28902->28901 28904 10a1170 CreateProcessA 28902->28904 28905 10a1165 CreateProcessA 28902->28905 28903 10a3ba2 28903->28818 28904->28903 28905->28903 28907 10a3e38 28906->28907 28909 10a0e28 VirtualAllocEx 28907->28909 28910 10a0e20 VirtualAllocEx 28907->28910 28908 10a424d 28909->28908 28910->28908 28914 10a0ee8 WriteProcessMemory 28911->28914 28915 10a0ee0 WriteProcessMemory 28911->28915 28912 10a4404 28912->28818 28913 10a3fe3 28913->28911 28913->28912 28914->28913 28915->28913 28917 10a11f9 28916->28917 28917->28917 28918 10a135e CreateProcessA 28917->28918 28919 10a13bb 28918->28919 28919->28919 28921 10a1170 CreateProcessA 28920->28921 28923 10a13bb 28921->28923 28923->28923 28925 10a08a8 ResumeThread 28924->28925 28927 10a08d9 28925->28927 28927->28856 28929 10a08a8 ResumeThread 28928->28929 28931 10a08d9 28929->28931 28931->28856 28933 10a46dd 28932->28933 28942 10a0d49 28933->28942 28946 10a0d50 28933->28946 28934 10a46f3 28934->28861 28938 10a46c8 28937->28938 28940 10a0d49 Wow64SetThreadContext 28938->28940 28941 10a0d50 Wow64SetThreadContext 28938->28941 28939 10a46f3 28939->28861 28940->28939 28941->28939 28943 10a0d95 Wow64SetThreadContext 28942->28943 28945 10a0ddd 28943->28945 28945->28934 28947 10a0d95 Wow64SetThreadContext 28946->28947 28949 10a0ddd 28947->28949 28949->28934 28951 10a0f30 WriteProcessMemory 28950->28951 28953 10a0f87 28951->28953 28953->28866 28955 10a0f30 WriteProcessMemory 28954->28955 28957 10a0f87 28955->28957 28957->28866 28959 10a0e68 VirtualAllocEx 28958->28959 28961 10a0ea5 28959->28961 28961->28880 28963 10a0e68 VirtualAllocEx 28962->28963 28965 10a0ea5 28963->28965 28965->28880 28966 10a48e0 28967 10a4906 28966->28967 28968 10a4a6b 28966->28968 28967->28968 28970 10a1cc4 28967->28970 28971 10a4b60 PostMessageW 28970->28971 28973 10a4bcc 28971->28973 28973->28967 28974 1044668 28975 1044672 28974->28975 28977 1044758 28974->28977 28978 104477d 28977->28978 28982 1044858 28978->28982 28986 1044868 28978->28986 28979 1044787 28979->28975 28984 1044868 28982->28984 28983 104496c 28983->28979 28984->28983 28990 10444b0 28984->28990 28987 104488f 28986->28987 28988 104496c 28987->28988 28989 10444b0 CreateActCtxA 28987->28989 28988->28979 28989->28988 28991 10458f8 CreateActCtxA 28990->28991 28993 10459bb 28991->28993 29017 104fa38 29018 104fa7e GetCurrentProcess 29017->29018 29020 104fad0 GetCurrentThread 29018->29020 29021 104fac9 29018->29021 29022 104fb0d GetCurrentProcess 29020->29022 29023 104fb06 29020->29023 29021->29020 29026 104fb43 29022->29026 29023->29022 29024 104fb6b GetCurrentThreadId 29025 104fb9c 29024->29025 29026->29024
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 46221bc442e214b46bcd8706e2e19772c528f1eefb3ab1de8b760a0de89f3a8d
                                          • Instruction ID: b693f869a3a35c17d611e1a8b9c1bef61f9c37c153109f6aa4e8d382011ad0da
                                          • Opcode Fuzzy Hash: 46221bc442e214b46bcd8706e2e19772c528f1eefb3ab1de8b760a0de89f3a8d
                                          • Instruction Fuzzy Hash: D1B1DF75E04248DFDB04DFE8C8416BEBBF2BF44302F14C1AAE591AB292D7349942C792
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2d7085dc0d3b496485a33be8610d611f1ea00d98cec851562381fe86c1a76d3
                                          • Instruction ID: 7191d0f93d5186a3e614ced3a6dc38cb61c8352b46a3c19480e397cf0562ae9c
                                          • Opcode Fuzzy Hash: d2d7085dc0d3b496485a33be8610d611f1ea00d98cec851562381fe86c1a76d3
                                          • Instruction Fuzzy Hash: F391F374E06609DFCB48CFE9D580A9DBBB2FF89301F20A41AE416BB268D7349945CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b70bccd060ef777e111fc90d6617bd1b9dc1b05f8e98b69e995cc3cf109fea18
                                          • Instruction ID: cb4f5b2fd4bc50332b224edb6b082d0ddc03805e1299d255c983cbe1d03c2672
                                          • Opcode Fuzzy Hash: b70bccd060ef777e111fc90d6617bd1b9dc1b05f8e98b69e995cc3cf109fea18
                                          • Instruction Fuzzy Hash: 87910474E06609DFCB48CFE9D580A9DBBF2FF89301F20A42AE416B7268D73499058F54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0940de1131c0c8160b2d803db39f67f5ccce5ec3c53e63e82164a0c093e3264
                                          • Instruction ID: 376a45008a6a1e81e15994984a7ab29f28d87c702cb6f1411e2f1f9b5e83a44f
                                          • Opcode Fuzzy Hash: b0940de1131c0c8160b2d803db39f67f5ccce5ec3c53e63e82164a0c093e3264
                                          • Instruction Fuzzy Hash: EF810FB5E06629DFDB04CFE9D9809EEFBB2FB88301F10996AD405A7254D7389902CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 21cfee9c59408369199708cff11acbb5d40716f2ffc5dc893e4745c0f8f6205b
                                          • Instruction ID: 45132d5fcda0035f9c654c3bc2ecf9d301879581b560626a73347eee4d05b4b9
                                          • Opcode Fuzzy Hash: 21cfee9c59408369199708cff11acbb5d40716f2ffc5dc893e4745c0f8f6205b
                                          • Instruction Fuzzy Hash: FB8111B5E06619DFDB04CFE9C980AEEFBB2FB88301F00996AD405A7254D7389912CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 104fa28-104fac7 GetCurrentProcess 298 104fad0-104fb04 GetCurrentThread 294->298 299 104fac9-104facf 294->299 300 104fb06-104fb0c 298->300 301 104fb0d-104fb41 GetCurrentProcess 298->301 299->298 300->301 303 104fb43-104fb49 301->303 304 104fb4a-104fb65 call 104fc07 301->304 303->304 307 104fb6b-104fb9a GetCurrentThreadId 304->307 308 104fba3-104fc05 307->308 309 104fb9c-104fba2 307->309 309->308
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0104FAB6
                                          • GetCurrentThread.KERNEL32 ref: 0104FAF3
                                          • GetCurrentProcess.KERNEL32 ref: 0104FB30
                                          • GetCurrentThreadId.KERNEL32 ref: 0104FB89
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 53aee69d8a105d592300b0e21eed8f312ef60bce5560a1403b23491746c4bb67
                                          • Instruction ID: 48a906134bec038ca7e93a1d53024ff66127794c344a28a1a55e449dd2d61e6e
                                          • Opcode Fuzzy Hash: 53aee69d8a105d592300b0e21eed8f312ef60bce5560a1403b23491746c4bb67
                                          • Instruction Fuzzy Hash: 505166B09002498FDB14DFA9D588B9EBBF1AF88304F20C06DE159A72A0DB755984CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 316 104fa38-104fac7 GetCurrentProcess 320 104fad0-104fb04 GetCurrentThread 316->320 321 104fac9-104facf 316->321 322 104fb06-104fb0c 320->322 323 104fb0d-104fb41 GetCurrentProcess 320->323 321->320 322->323 325 104fb43-104fb49 323->325 326 104fb4a-104fb65 call 104fc07 323->326 325->326 329 104fb6b-104fb9a GetCurrentThreadId 326->329 330 104fba3-104fc05 329->330 331 104fb9c-104fba2 329->331 331->330
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0104FAB6
                                          • GetCurrentThread.KERNEL32 ref: 0104FAF3
                                          • GetCurrentProcess.KERNEL32 ref: 0104FB30
                                          • GetCurrentThreadId.KERNEL32 ref: 0104FB89
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 2489f7182e08f293353d511396a11549828620d65cd3a1060ab2698c16df5466
                                          • Instruction ID: b03474a615032dd9d706408c5a2ba8b4693272b67638e60f23c7818038adacfb
                                          • Opcode Fuzzy Hash: 2489f7182e08f293353d511396a11549828620d65cd3a1060ab2698c16df5466
                                          • Instruction Fuzzy Hash: 9C5157B09002498FDB14DFAAD588B9EBBF1EF88304F20C069E159A7360DB749984CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 801 80add0e-80add16 802 80add18-80add1f 801->802 803 80adca2-80adcad 801->803 804 80add78-80add81 802->804 805 80ae0a0-80ae1a8 802->805 803->804 806 80add88-80adda0 804->806 807 80add83 804->807 811 80ae3bb-80ae3d6 805->811 806->811 807->806 815 80ae3e1-80ae3f2 811->815 824 80ae3f8 call 10a046a 815->824 825 80ae3f8 call 10a0478 815->825 817 80ae3fe-80ae415 821 80ae416 817->821 821->821 824->817 825->817
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$o
                                          • API String ID: 0-4157579757
                                          • Opcode ID: a3e3bbf311da31a7488af40b6c798a8d142b8315bed1691a49f497b02c23b577
                                          • Instruction ID: 1b76c27c682b751b9a17bf9cace7dfa9d977935fe8f87e102dd52d4512684d2a
                                          • Opcode Fuzzy Hash: a3e3bbf311da31a7488af40b6c798a8d142b8315bed1691a49f497b02c23b577
                                          • Instruction Fuzzy Hash: EA311A34A0511A8FD720DF68DD54BA9BBB6FF86202F0081A9E40E97756DF785D81CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 826 10a1165-10a1205 829 10a123e-10a125e 826->829 830 10a1207-10a1211 826->830 837 10a1260-10a126a 829->837 838 10a1297-10a12c6 829->838 830->829 831 10a1213-10a1215 830->831 832 10a1238-10a123b 831->832 833 10a1217-10a1221 831->833 832->829 835 10a1223 833->835 836 10a1225-10a1234 833->836 835->836 836->836 839 10a1236 836->839 837->838 840 10a126c-10a126e 837->840 846 10a12c8-10a12d2 838->846 847 10a12ff-10a13b9 CreateProcessA 838->847 839->832 841 10a1270-10a127a 840->841 842 10a1291-10a1294 840->842 844 10a127e-10a128d 841->844 845 10a127c 841->845 842->838 844->844 848 10a128f 844->848 845->844 846->847 849 10a12d4-10a12d6 846->849 858 10a13bb-10a13c1 847->858 859 10a13c2-10a1448 847->859 848->842 851 10a12d8-10a12e2 849->851 852 10a12f9-10a12fc 849->852 853 10a12e6-10a12f5 851->853 854 10a12e4 851->854 852->847 853->853 856 10a12f7 853->856 854->853 856->852 858->859 869 10a144a-10a144e 859->869 870 10a1458-10a145c 859->870 869->870 871 10a1450 869->871 872 10a145e-10a1462 870->872 873 10a146c-10a1470 870->873 871->870 872->873 876 10a1464 872->876 874 10a1472-10a1476 873->874 875 10a1480-10a1484 873->875 874->875 877 10a1478 874->877 878 10a1496-10a149d 875->878 879 10a1486-10a148c 875->879 876->873 877->875 880 10a149f-10a14ae 878->880 881 10a14b4 878->881 879->878 880->881 883 10a14b5 881->883 883->883
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 010A13A6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: a822939d3d008d31bcbb771f61ef2b461748a9418c62148f8447a1221df40b55
                                          • Instruction ID: 9d3f7adfdc3974bb6f03190f119ca0876c8867e372cd297505bad11d7bfeb592
                                          • Opcode Fuzzy Hash: a822939d3d008d31bcbb771f61ef2b461748a9418c62148f8447a1221df40b55
                                          • Instruction Fuzzy Hash: 33A15AB1D00219CFEB10DFA8C940BEDBBF2BF48310F5481A9E858A7290DB749995CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 884 10a1170-10a1205 886 10a123e-10a125e 884->886 887 10a1207-10a1211 884->887 894 10a1260-10a126a 886->894 895 10a1297-10a12c6 886->895 887->886 888 10a1213-10a1215 887->888 889 10a1238-10a123b 888->889 890 10a1217-10a1221 888->890 889->886 892 10a1223 890->892 893 10a1225-10a1234 890->893 892->893 893->893 896 10a1236 893->896 894->895 897 10a126c-10a126e 894->897 903 10a12c8-10a12d2 895->903 904 10a12ff-10a13b9 CreateProcessA 895->904 896->889 898 10a1270-10a127a 897->898 899 10a1291-10a1294 897->899 901 10a127e-10a128d 898->901 902 10a127c 898->902 899->895 901->901 905 10a128f 901->905 902->901 903->904 906 10a12d4-10a12d6 903->906 915 10a13bb-10a13c1 904->915 916 10a13c2-10a1448 904->916 905->899 908 10a12d8-10a12e2 906->908 909 10a12f9-10a12fc 906->909 910 10a12e6-10a12f5 908->910 911 10a12e4 908->911 909->904 910->910 913 10a12f7 910->913 911->910 913->909 915->916 926 10a144a-10a144e 916->926 927 10a1458-10a145c 916->927 926->927 928 10a1450 926->928 929 10a145e-10a1462 927->929 930 10a146c-10a1470 927->930 928->927 929->930 933 10a1464 929->933 931 10a1472-10a1476 930->931 932 10a1480-10a1484 930->932 931->932 934 10a1478 931->934 935 10a1496-10a149d 932->935 936 10a1486-10a148c 932->936 933->930 934->932 937 10a149f-10a14ae 935->937 938 10a14b4 935->938 936->935 937->938 940 10a14b5 938->940 940->940
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 010A13A6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 2ebe2212ea3950b39ead4629d94520967b43a3bda363376bc24153423d44ec14
                                          • Instruction ID: b96acc809bba97bf6495d63a72824ceffa661dc104bac3c58fbc13c8c36a5a1c
                                          • Opcode Fuzzy Hash: 2ebe2212ea3950b39ead4629d94520967b43a3bda363376bc24153423d44ec14
                                          • Instruction Fuzzy Hash: B7915CB1D00219CFEB10DFA8C940BEDBBF2BF48310F5481A9E858A7294DB749995CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 941 104d397-104d3b7 942 104d3e3-104d3e7 941->942 943 104d3b9-104d3c6 call 104c700 941->943 945 104d3e9-104d3f3 942->945 946 104d3fb-104d43c 942->946 949 104d3dc 943->949 950 104d3c8 943->950 945->946 952 104d43e-104d446 946->952 953 104d449-104d457 946->953 949->942 998 104d3ce call 104d630 950->998 999 104d3ce call 104d640 950->999 952->953 954 104d459-104d45e 953->954 955 104d47b-104d47d 953->955 957 104d460-104d467 call 104c70c 954->957 958 104d469 954->958 960 104d480-104d487 955->960 956 104d3d4-104d3d6 956->949 959 104d518-104d5d8 956->959 962 104d46b-104d479 957->962 958->962 991 104d5e0-104d60b GetModuleHandleW 959->991 992 104d5da-104d5dd 959->992 963 104d494-104d49b 960->963 964 104d489-104d491 960->964 962->960 967 104d49d-104d4a5 963->967 968 104d4a8-104d4b1 call 104c71c 963->968 964->963 967->968 972 104d4b3-104d4bb 968->972 973 104d4be-104d4c3 968->973 972->973 974 104d4c5-104d4cc 973->974 975 104d4e1-104d4e5 973->975 974->975 977 104d4ce-104d4de call 104c72c call 104c73c 974->977 996 104d4e8 call 104d930 975->996 997 104d4e8 call 104d940 975->997 977->975 980 104d4eb-104d4ee 982 104d4f0-104d50e 980->982 983 104d511-104d517 980->983 982->983 993 104d614-104d628 991->993 994 104d60d-104d613 991->994 992->991 994->993 996->980 997->980 998->956 999->956
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0104D5FE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 92ff644707a835fccebd86507765dfe1f7a098fb809b56f102ac6f2cfff75dae
                                          • Instruction ID: 4846a23b4ae14e4c13a044d6a26b802b58256367130d1c2ee74be1f032a21041
                                          • Opcode Fuzzy Hash: 92ff644707a835fccebd86507765dfe1f7a098fb809b56f102ac6f2cfff75dae
                                          • Instruction Fuzzy Hash: BB8123B0A00B058FDB64DF69D48179ABBF1BF88304F008A6ED48AD7A50DB75E945CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1000 80af268-80af27f 1001 80af288-80af28e 1000->1001 1002 80af281-80af286 1000->1002 1003 80af291-80af295 1001->1003 1002->1003 1004 80af29e-80af2a4 1003->1004 1005 80af297-80af29c 1003->1005 1006 80af2a7-80af2ab 1004->1006 1005->1006 1007 80af2cf-80af2d3 1006->1007 1008 80af2ad-80af2ca 1006->1008 1009 80af2f7-80af302 1007->1009 1010 80af2d5-80af2f2 1007->1010 1018 80af4ef-80af4f8 1008->1018 1012 80af30a-80af310 1009->1012 1013 80af304-80af307 1009->1013 1010->1018 1015 80af4fb-80af79e 1012->1015 1016 80af316-80af326 1012->1016 1013->1012 1022 80af34b-80af370 1016->1022 1023 80af328-80af346 1016->1023 1030 80af4b8-80af4bd 1022->1030 1031 80af376-80af37f 1022->1031 1027 80af4af-80af4b2 1023->1027 1027->1030 1027->1031 1030->1015 1032 80af4bf-80af4c2 1030->1032 1031->1015 1033 80af385-80af39d 1031->1033 1036 80af4c6-80af4c9 1032->1036 1037 80af4c4 1032->1037 1041 80af3af-80af3c6 1033->1041 1042 80af39f-80af3a4 1033->1042 1036->1015 1038 80af4cb-80af4ed 1036->1038 1037->1018 1038->1018 1049 80af3c8 1041->1049 1050 80af3ce-80af3d8 1041->1050 1042->1015 1044 80af3aa-80af3ad 1042->1044 1044->1041 1047 80af3dd-80af3e2 1044->1047 1047->1015 1051 80af3e8-80af3f7 1047->1051 1049->1050 1050->1030 1057 80af3f9 1051->1057 1058 80af3ff-80af40f 1051->1058 1057->1058 1058->1015 1062 80af415-80af418 1058->1062 1062->1015 1063 80af41e-80af421 1062->1063 1064 80af472-80af484 1063->1064 1065 80af423-80af427 1063->1065 1064->1027 1074 80af486-80af49b 1064->1074 1065->1015 1067 80af42d-80af433 1065->1067 1068 80af444-80af44a 1067->1068 1069 80af435-80af43b 1067->1069 1068->1015 1073 80af450-80af45c 1068->1073 1069->1015 1072 80af441 1069->1072 1072->1068 1081 80af464-80af470 1073->1081 1078 80af49d 1074->1078 1079 80af4a3-80af4ad 1074->1079 1078->1079 1079->1030 1081->1064
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'kq
                                          • API String ID: 0-3255046985
                                          • Opcode ID: 9110c6a2d0a1ef37612a3a4f99097022f1e55da0a72d498082c1429fd748da61
                                          • Instruction ID: c0291dbcfd44623f7800eace19bd2d251619b8b1f3c4f7e47757c794f251fd4f
                                          • Opcode Fuzzy Hash: 9110c6a2d0a1ef37612a3a4f99097022f1e55da0a72d498082c1429fd748da61
                                          • Instruction Fuzzy Hash: 4BE14F35A00609DFDB05EFA8D544AAEBBB7FF88310F108499E805B7368DB359D85CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1108 10458ec-10459b9 CreateActCtxA 1110 10459c2-1045a1c 1108->1110 1111 10459bb-10459c1 1108->1111 1118 1045a1e-1045a21 1110->1118 1119 1045a2b-1045a2f 1110->1119 1111->1110 1118->1119 1120 1045a40 1119->1120 1121 1045a31-1045a3d 1119->1121 1123 1045a41 1120->1123 1121->1120 1123->1123
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 010459A9
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 6cdb9a0a86390255b30a1e7c1ee3c7512f4b6a5b203aa6436e717f8e706c61d4
                                          • Instruction ID: ae1fb4eb2234fd605e85de1661a445b9c39d19eebc60457105c785ad0ac63b62
                                          • Opcode Fuzzy Hash: 6cdb9a0a86390255b30a1e7c1ee3c7512f4b6a5b203aa6436e717f8e706c61d4
                                          • Instruction Fuzzy Hash: 0C41E2B0C00719CFDB24CFA9C984A8DBBF5BF49704F2081AAD448AB255DB756986CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1124 10444b0-10459b9 CreateActCtxA 1127 10459c2-1045a1c 1124->1127 1128 10459bb-10459c1 1124->1128 1135 1045a1e-1045a21 1127->1135 1136 1045a2b-1045a2f 1127->1136 1128->1127 1135->1136 1137 1045a40 1136->1137 1138 1045a31-1045a3d 1136->1138 1140 1045a41 1137->1140 1138->1137 1140->1140
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 010459A9
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 9783bdc7b6213141538f99d42aece94245724b8cdf6d54e3d741acfdb40cc9ad
                                          • Instruction ID: 29787b65d2f454dbd1662c0b2d0bc9235afc17e5fdc3b5e9b562904fe52a26f5
                                          • Opcode Fuzzy Hash: 9783bdc7b6213141538f99d42aece94245724b8cdf6d54e3d741acfdb40cc9ad
                                          • Instruction Fuzzy Hash: F441E3B0C0071DCBDB24DFA9C884B8DBBF5BF49704F2081AAD548AB255DB756986CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1141 10a0ee0-10a0f36 1143 10a0f38-10a0f44 1141->1143 1144 10a0f46-10a0f85 WriteProcessMemory 1141->1144 1143->1144 1146 10a0f8e-10a0fbe 1144->1146 1147 10a0f87-10a0f8d 1144->1147 1147->1146
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 010A0F78
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: a6d20fc51512c9cc5486539feadbc8d11b250bb92f173c54c6505508c0051efc
                                          • Instruction ID: 7cd3133729ef3d441787c40c7bc13a1739b810c2017e42122a3e476f5236e689
                                          • Opcode Fuzzy Hash: a6d20fc51512c9cc5486539feadbc8d11b250bb92f173c54c6505508c0051efc
                                          • Instruction Fuzzy Hash: E62135B59003598FDB10DFA9C884BDEBBF5FB48320F10842AE959A7250C7789544CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 010A0F78
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 03f85746e581e6ba899a47a23c52a8919dbee442df7c3fcfccfab2c7cd2799b8
                                          • Instruction ID: 88336b48a4346e1873845fd6bdba265fa3c9598dfbf774aa236fdefedf0f8543
                                          • Opcode Fuzzy Hash: 03f85746e581e6ba899a47a23c52a8919dbee442df7c3fcfccfab2c7cd2799b8
                                          • Instruction Fuzzy Hash: C92155B59003599FCB10CFAAC884BDEBBF5FF48320F10842AE958A7250C7789944CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0104FD07
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: f9da191ac0a832cf589d6623040cf53b78ba8cc33bb279ce4656ce431cf98560
                                          • Instruction ID: 097f5cd07171c3cd542b1ca14b784a91627b9b25a916d4226cac4fdaf3a0a8ac
                                          • Opcode Fuzzy Hash: f9da191ac0a832cf589d6623040cf53b78ba8cc33bb279ce4656ce431cf98560
                                          • Instruction Fuzzy Hash: 0F21F4B5900259DFDB10CFAAD984ADEBFF4FB48310F24805AE954A7310C375A940CF64
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 010A0DCE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: c836def1e55a9cda81753dc8213dc253fd2d208d5eca725a412afd94f54b7e72
                                          • Instruction ID: 67a163dc70593b397fe35a04e79594ff58be88726f2fb9574c8fc11237a8f739
                                          • Opcode Fuzzy Hash: c836def1e55a9cda81753dc8213dc253fd2d208d5eca725a412afd94f54b7e72
                                          • Instruction Fuzzy Hash: 0A2148719003088FDB10DFAAC4847EEBFF4AF88324F54842AD499A7245C778A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 010A1058
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 5bcac3eaabc22f91ea366c3ccacda685b4dfaa4899cafcc42cb4d8be4af63c8f
                                          • Instruction ID: a4cc2a17e7afc3316ef68222b0480c77a4ee3bd9d5d2f535cbe62684661dc426
                                          • Opcode Fuzzy Hash: 5bcac3eaabc22f91ea366c3ccacda685b4dfaa4899cafcc42cb4d8be4af63c8f
                                          • Instruction Fuzzy Hash: 562126B19003599FDB10DFA9C844AEEBBF5FF88320F50842EE559A7250C7759944CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 010A0DCE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: a3d666ba67605a0ff521a239b5e2cf7e9d1f0b250e52d3825417beb8f3a684fd
                                          • Instruction ID: c61b681de966c6d6bf6eca55389d744c659e62281256fc9068262e097ef4e4a6
                                          • Opcode Fuzzy Hash: a3d666ba67605a0ff521a239b5e2cf7e9d1f0b250e52d3825417beb8f3a684fd
                                          • Instruction Fuzzy Hash: BC2149719003098FDB10DFAAC4857EEBFF4EF88324F50842AD559A7244C778A944CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 010A1058
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: a67628e0ceb19692f119fded30791964e1f7b1a9cdfeed6f7d3213961ecbd156
                                          • Instruction ID: 28d82a981a6b134a915dd81efd378f0f9317c0f42aab53f32669d112111e42e0
                                          • Opcode Fuzzy Hash: a67628e0ceb19692f119fded30791964e1f7b1a9cdfeed6f7d3213961ecbd156
                                          • Instruction Fuzzy Hash: F72125B19003599FCB10DFAAC884AEEBBF5FF48320F50842AE558A7250C7799944CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0104FD07
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: a57528147a6d5fac6d259e2cb8250bf40166d96127088d5bb54d388dc2b66466
                                          • Instruction ID: ff8d11a3216ddbc2593c2e7bd24ad326f59e0dbd0bca6c3fed76e528f62e6ab4
                                          • Opcode Fuzzy Hash: a57528147a6d5fac6d259e2cb8250bf40166d96127088d5bb54d388dc2b66466
                                          • Instruction Fuzzy Hash: 2D21E4B59002599FDB10CFAAD984ADEBFF9EB48310F14801AE954A3350D374A940CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0104D679,00000800,00000000,00000000), ref: 0104D88A
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 1240522abedb66eedd8b6a84c58ae07a4b19f5483e5dd22a7d0c34ab37032304
                                          • Instruction ID: 64e9fdd2d726dcabefc07c994ab39a4c60890d96637dcb121bc3c3e3b7fe8991
                                          • Opcode Fuzzy Hash: 1240522abedb66eedd8b6a84c58ae07a4b19f5483e5dd22a7d0c34ab37032304
                                          • Instruction Fuzzy Hash: CB1112B6D003489FDB10DF9AC888AEEFBF4EB58320F10846EE559A7210C375A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0104D679,00000800,00000000,00000000), ref: 0104D88A
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 6aa43fc36f3b0fd3eb19a524f47e75308a48d8f3048b90fa103ffbcbe9b37348
                                          • Instruction ID: be84560e30bcd6c54b43cba5260749b5427dd954373b696fc6ec8c91faae5355
                                          • Opcode Fuzzy Hash: 6aa43fc36f3b0fd3eb19a524f47e75308a48d8f3048b90fa103ffbcbe9b37348
                                          • Instruction Fuzzy Hash: 5B1156B6D003088FDB10DF9AC484AEEFBF4EB98320F10842ED559A7210C375A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 010A0E96
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: def8fcd1a82d40b89b044c5540a6c9420da202121517f32396f501c82d07b76a
                                          • Instruction ID: a55de345faeb767bf5b03ec70b8142984d07237ab93c0666d2fc7d616c20c553
                                          • Opcode Fuzzy Hash: def8fcd1a82d40b89b044c5540a6c9420da202121517f32396f501c82d07b76a
                                          • Instruction Fuzzy Hash: 981129769002498FDB10DFA9C844BEFBFF5AF48324F14841AE595A7260C7359554DFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 010A0E96
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: b000d05b8799e3ad2bda25a6d04285118bc84789be2928b9a9035de328db0753
                                          • Instruction ID: ee2d0ee744090ef40c9cbe66a7e54a32d150c9fa925fb844d751e6e35e6568f1
                                          • Opcode Fuzzy Hash: b000d05b8799e3ad2bda25a6d04285118bc84789be2928b9a9035de328db0753
                                          • Instruction Fuzzy Hash: 521137769002499FCB10DFAAC844BDFBFF5EF48320F108819E555A7250C775A544CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 5689d9ccd6b72fcaa27a8549c776b1af1a9123e3e4b156dfff7ba512f5d53a00
                                          • Instruction ID: 3dd7606c31d9146838f8d0b1ece768632342c3108fd4a4b9ec824733f4e59b88
                                          • Opcode Fuzzy Hash: 5689d9ccd6b72fcaa27a8549c776b1af1a9123e3e4b156dfff7ba512f5d53a00
                                          • Instruction Fuzzy Hash: 001149B1D003488FDB14DFA9C4457EEBBF4AF88324F20882AD455A7250C7796944CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 010A4BBD
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: d5eb79c9f7045bc9c949401b511d4584e5f46a1237c633ed03df518df3395376
                                          • Instruction ID: 92debbf9983110ca47ac89272b8691a7bbf6a30778606d8c18141472c0534738
                                          • Opcode Fuzzy Hash: d5eb79c9f7045bc9c949401b511d4584e5f46a1237c633ed03df518df3395376
                                          • Instruction Fuzzy Hash: CF1155B58003889FDB10CF9AD889BDEFFF8EB48324F24885AD554A7240C3B5A544CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 54cf9b4252443bc79a13e511c6a77bd124b071ff00acc3bee4eb256af3fd9abf
                                          • Instruction ID: 8af49d45167ede9125858fe9d0a14b0eccb983d7c79485a00ca1713936a0ce93
                                          • Opcode Fuzzy Hash: 54cf9b4252443bc79a13e511c6a77bd124b071ff00acc3bee4eb256af3fd9abf
                                          • Instruction Fuzzy Hash: ED113AB5D003498FDB10DFAAC4457DEFBF8EB88324F208829D559A7254C775A544CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0104D5FE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808132090.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_1040000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 3444dffff160f6b84a9ce862c8fd35a228a9ea84a60711b7cc61e8cddf5a7420
                                          • Instruction ID: 556095b700f0c3de2cd6e615b2382ea9a8c0ed6cb7099a4f9868b46ce7f70d79
                                          • Opcode Fuzzy Hash: 3444dffff160f6b84a9ce862c8fd35a228a9ea84a60711b7cc61e8cddf5a7420
                                          • Instruction Fuzzy Hash: 751110B5D003498FDB10DF9AC844ADEFBF4AB88324F10846AD968A7210C375A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 010A4BBD
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1808372074.00000000010A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_10a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 6e9802d7b154f0664ab01ece8c2fff4486c2f510cd930fa61bbf687e54be1204
                                          • Instruction ID: 96374ca7e8a3b9077c2febd55f7e5eac65f7e757dd572df5fcf6212781d55f1e
                                          • Opcode Fuzzy Hash: 6e9802d7b154f0664ab01ece8c2fff4486c2f510cd930fa61bbf687e54be1204
                                          • Instruction Fuzzy Hash: 9E11F5B98003499FDB10DF9AD845BDEFBF8EB48310F148459E554A7340C375A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: 9bb034306d8949bdcfe2132d86e2d7bdb9323357fb7c720bd34bc9071635eb11
                                          • Instruction ID: 0905ff92b464d6672c46ac092d5c5ab855d3e5df2c4920b0173bcbd31beae35f
                                          • Opcode Fuzzy Hash: 9bb034306d8949bdcfe2132d86e2d7bdb9323357fb7c720bd34bc9071635eb11
                                          • Instruction Fuzzy Hash: C541BE75B006058FCB10EFB998449AEBBF7EFC52217248569E429DB391EB70DD068790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: mfU
                                          • API String ID: 0-2548623419
                                          • Opcode ID: 69ef9012c9c3d8fe5745cd90843a684b186bb9a07e1eb294af9ea76fd0faf819
                                          • Instruction ID: 02da69b77dd217e47d6405261da1d77f096af58781c23554fd0a9fc9a7b8fbbb
                                          • Opcode Fuzzy Hash: 69ef9012c9c3d8fe5745cd90843a684b186bb9a07e1eb294af9ea76fd0faf819
                                          • Instruction Fuzzy Hash: 6741F2B1D003499FDB10DFE9C984ACDBBB5BF49305F24806AD408BB255D7B56A49CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: mfU
                                          • API String ID: 0-2548623419
                                          • Opcode ID: f691731482f07bde0b77f72086a9d63ccbbbadd253d7bdaccfdd33ad429bba54
                                          • Instruction ID: b10f7dce2217ffc56f6e10d274585fd3063a68eccd3c2fb153afb3ca5f8634a3
                                          • Opcode Fuzzy Hash: f691731482f07bde0b77f72086a9d63ccbbbadd253d7bdaccfdd33ad429bba54
                                          • Instruction Fuzzy Hash: 9A41D0B1D00209DFDB20DFE9C984ACEBBB6BF48305F248429D408BB255D7B56A45CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: mfU
                                          • API String ID: 0-2548623419
                                          • Opcode ID: 9427391276852eaed1664719e970659eb61fa47afe637c2a195aa8061434f235
                                          • Instruction ID: 67e3b5c60ada47a621333643703a94d68136df94b84df9006cdf82dcc2b48c2a
                                          • Opcode Fuzzy Hash: 9427391276852eaed1664719e970659eb61fa47afe637c2a195aa8061434f235
                                          • Instruction Fuzzy Hash: AC41C1B1D01209DFDB10DFE9C984ACDBBB6BF48305F648429D408BB255D7B5AA49CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: 800b4e0d4aeb8a9a945da13fa2b6ed42b30f34b39bd9500395e9f398e2614746
                                          • Instruction ID: 6965d3b24eb78010c3eddb9b627ed6f4b82a4b43c940fe503845bc1855b2b200
                                          • Opcode Fuzzy Hash: 800b4e0d4aeb8a9a945da13fa2b6ed42b30f34b39bd9500395e9f398e2614746
                                          • Instruction Fuzzy Hash: B231E4B4E042588FDB08CFEAC9546EEBBF6EF89301F109029D41AAB395DB745906CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: mfU
                                          • API String ID: 0-2548623419
                                          • Opcode ID: bd60225bc2614c324bf481bb145d731007e2240bbf354a1474663867df0fa0e9
                                          • Instruction ID: fba471a57a80515f14d38525a1486d114fee14fefc9863bf42b5865f796c52e8
                                          • Opcode Fuzzy Hash: bd60225bc2614c324bf481bb145d731007e2240bbf354a1474663867df0fa0e9
                                          • Instruction Fuzzy Hash: AB21B2756006048FCB10EFB8C84449BBBE6EF84204B1588ADD546EB395EF75ED0A8B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: ae4e41ac354ff523245ee8f0dc1a0dc36cf5a651495fd6a5d972618e6fb14c2f
                                          • Instruction ID: a6457bac64a1ac12ae60e41429b66c76c4323b3390b63713350255c7c5560a45
                                          • Opcode Fuzzy Hash: ae4e41ac354ff523245ee8f0dc1a0dc36cf5a651495fd6a5d972618e6fb14c2f
                                          • Instruction Fuzzy Hash: B131B474E042188BDB44DFEAC9546EEBBF6FF89301F109029D41AAB399DB745906CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: mfU
                                          • API String ID: 0-2548623419
                                          • Opcode ID: 92dbe20fc69d86cd77ab6ab37fe60653ed2a56be8531163865247f48e0fda207
                                          • Instruction ID: 4fb93c54622cad2923a3315050c1a34c5738c885318d2faf4de21d215c647cbf
                                          • Opcode Fuzzy Hash: 92dbe20fc69d86cd77ab6ab37fe60653ed2a56be8531163865247f48e0fda207
                                          • Instruction Fuzzy Hash: 38210375A002048FC710DFA8C8448EBBBF6FF80204B1584A9E546AB3A5EB34ED058BD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: 1cc451de1213d780a81466135dc0513ac1ea55293e3425d5bd9d10056fe0e7e2
                                          • Instruction ID: 5c3acfd94337f9408cb68f5ab71ea422ff8c3f281b23dfd650d92a38e95d12fb
                                          • Opcode Fuzzy Hash: 1cc451de1213d780a81466135dc0513ac1ea55293e3425d5bd9d10056fe0e7e2
                                          • Instruction Fuzzy Hash: 6A115771B0020A8FCB58EBB999115EFB7F6AF98211B204479CA04E7254EB319E51CBE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: cbed8abfe1e0aee40c383e555360571259809cad7f255a5b803db1a241f2b193
                                          • Instruction ID: 0a9479b1b42751ab4fd00b06bbdeb068ed582bb03afdab2b157cd8bc6d552d15
                                          • Opcode Fuzzy Hash: cbed8abfe1e0aee40c383e555360571259809cad7f255a5b803db1a241f2b193
                                          • Instruction Fuzzy Hash: E0115375E002098FCB04DFE8C8849ADFBB2FB88310F208169D919AB355D6316955CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 743271bfe7b34a70c5e25f7df477eb431a9287d09a6b8166147c9e30145bc462
                                          • Instruction ID: 37dfdb8c38a6b12a1a5691d8e550ffffdf92184f454df67e2d6990b69f5ce682
                                          • Opcode Fuzzy Hash: 743271bfe7b34a70c5e25f7df477eb431a9287d09a6b8166147c9e30145bc462
                                          • Instruction Fuzzy Hash: 35E01AB590C384DBE705CAA5C4686E87F7AEB9A246F1990D9D8490E147D63841068B05
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: mfU
                                          • API String ID: 0-2548623419
                                          • Opcode ID: 0eef8eab2c855b056c4372090f9df1fce303e161317e9b9baeb9dd9f2b81ddf0
                                          • Instruction ID: dab68bf28c0c59adfd90a4b7a030995b5b86453b7c45dbea6023b2dc6dbbea1d
                                          • Opcode Fuzzy Hash: 0eef8eab2c855b056c4372090f9df1fce303e161317e9b9baeb9dd9f2b81ddf0
                                          • Instruction Fuzzy Hash: 4BE0C2351082486FD742DFA4D950D923FE8BF0620030480B6E090CF033E621E425D792
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f339498a56417d9dc8f9ea6e25c33d22e5b0ea5d13107a9130fd1b23de66adc
                                          • Instruction ID: 0bc10877ae1146dfa0a38a5586098dab46468be274c739768f2a52299d9d0463
                                          • Opcode Fuzzy Hash: 9f339498a56417d9dc8f9ea6e25c33d22e5b0ea5d13107a9130fd1b23de66adc
                                          • Instruction Fuzzy Hash: C2A1E670E452198FCB04DBE8D5806EDFBB6FF89301F109629D419AB396DB30A985CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fa61f045859f7890b7f4ef09539191a7ab1d5e5d2dcd0ce36990601c1261f77
                                          • Instruction ID: 98156024ac2d34ee274d8ffff3cadc03da3251c8d486d79d11a2630c6c71dbee
                                          • Opcode Fuzzy Hash: 2fa61f045859f7890b7f4ef09539191a7ab1d5e5d2dcd0ce36990601c1261f77
                                          • Instruction Fuzzy Hash: 67415BB6F04248AFDB01DBB4DC046ED7BFBDFA2201F1944AAD415EB262EA31D906C754
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7cbbfdf7a57e4760910ce69c678477064e6b1887a3e5ff6fadbaa7224cdfe75
                                          • Instruction ID: 98d4f14607a3a6e84478f19e71c40d644a4b34b0a41a05c22c4ea6ecc706a796
                                          • Opcode Fuzzy Hash: f7cbbfdf7a57e4760910ce69c678477064e6b1887a3e5ff6fadbaa7224cdfe75
                                          • Instruction Fuzzy Hash: 34514874E092088FCB04CFEAD8506FEBBF6EB8A322F14D16AD419A7252D7744942CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b08c8c95d217b4f3d53b930be72bda5e5f161f5de431bdd8f77ef97b55d294f
                                          • Instruction ID: e7af55a6d82534ee1ce815bb5ae85b49fb9fe4e02fb92fe1040aa593c479479a
                                          • Opcode Fuzzy Hash: 2b08c8c95d217b4f3d53b930be72bda5e5f161f5de431bdd8f77ef97b55d294f
                                          • Instruction Fuzzy Hash: 01519374D05218CFCB64CFA8C994AECBBB6FF49311F249199D809A7356C735A984CF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be0de3a526959c6df997fd893e68739b4678885d31e73936fc30f1dac1939981
                                          • Instruction ID: 13c1fcb36774044e4d76a0a8831a8d77139cf8874ac1af345ff4fa46b3020a6e
                                          • Opcode Fuzzy Hash: be0de3a526959c6df997fd893e68739b4678885d31e73936fc30f1dac1939981
                                          • Instruction Fuzzy Hash: 38416CB4E0060ADFCB44CFD9D8819EEBBB2FB89311F14952AD505B7364D774AA41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c9bcb1b5b58ee8a57a696d5899e13d5b0c0b6053079a8bf75174228eb76562e
                                          • Instruction ID: 1dc86ee49d4adbb48de0948aab3a58f112039973eba2f5f1f530bfdcafd91a36
                                          • Opcode Fuzzy Hash: 8c9bcb1b5b58ee8a57a696d5899e13d5b0c0b6053079a8bf75174228eb76562e
                                          • Instruction Fuzzy Hash: D0416A74E0020ADFCB44CFD9D8819EEBBB2FB89311F10952AD505BB364D7749A41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efbd302eaed40bf97034eba78f82eb68402f25e28a7aa09b90f9c97637639328
                                          • Instruction ID: d2ee8dfbe978de689855f70f7122657efac65cbdb28581a1733a725b64717f0a
                                          • Opcode Fuzzy Hash: efbd302eaed40bf97034eba78f82eb68402f25e28a7aa09b90f9c97637639328
                                          • Instruction Fuzzy Hash: 43318D71E0052ACBC7608FADD8406FEB7F2BF84312F05C1AAE595DB292D738D940CA90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7f8a1d9c896a326d6f55bbbd2f3caf776ed7ae6b52ad72d3033660099d2ff680
                                          • Instruction ID: 5eee90e7d2c0df6d6300462a05b87d3c04a83804085bc70ae7806c1c1dbf1673
                                          • Opcode Fuzzy Hash: 7f8a1d9c896a326d6f55bbbd2f3caf776ed7ae6b52ad72d3033660099d2ff680
                                          • Instruction Fuzzy Hash: CC414474906206CFD740DFACE9849ADBBF6FB49312B049459F41A9B352DB39A881CF14
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b91bd0bac34ea5529f65143142466ddde0e181b1400332cf3048d7f52cecdfef
                                          • Instruction ID: 9588cdb2b4aaa1284541bdacbd185b18d1fb966703ab2f843f7100a12391e0a7
                                          • Opcode Fuzzy Hash: b91bd0bac34ea5529f65143142466ddde0e181b1400332cf3048d7f52cecdfef
                                          • Instruction Fuzzy Hash: 1221B030744615DFD7284E99C81577A3BB3AB85702F25C0AEE05A8F2E6CA3ACC42C756
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807821469.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_e9d000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cd7ebf2db242a1af68d09b6d45b56c406367ce82a8ad80c443635432cdbf1319
                                          • Instruction ID: ec4822a67da35c6fa5690d51f3a52dd9a923d90664bcd0b42621036c06f6ed53
                                          • Opcode Fuzzy Hash: cd7ebf2db242a1af68d09b6d45b56c406367ce82a8ad80c443635432cdbf1319
                                          • Instruction Fuzzy Hash: BD212871508204DFDF05DF14DDC0B2ABF65FB94324F20C169D9095B256C336E856C6A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 13905f60d0ff05f344566bad5d720b6709a20847b6d35b7a2491d33bef2f5040
                                          • Instruction ID: 65854bcf5a5eb137eba88548d6563068d310fb4e5bc1471a0b0807a79cf98252
                                          • Opcode Fuzzy Hash: 13905f60d0ff05f344566bad5d720b6709a20847b6d35b7a2491d33bef2f5040
                                          • Instruction Fuzzy Hash: DD21D574E05228CFDB44CFA9D584AEDBBF6BF59302F20A169E406BB2A1D7349901CF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807871172.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_ead000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80ecaa6c89f660ac3e61eb6764f96afaf069fb984404b6491672d5be94ee6506
                                          • Instruction ID: ceb5eda76565cfc2ec2539c174e5f0920a1480732f5fa09065944ce6a665a537
                                          • Opcode Fuzzy Hash: 80ecaa6c89f660ac3e61eb6764f96afaf069fb984404b6491672d5be94ee6506
                                          • Instruction Fuzzy Hash: EC210471548304DFCB04DF54D9C0B26BBA5FB99318F20C56DE80A5F6A6C376E846CAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807871172.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_ead000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09fa889b29638d1078b03d6b42bbf8f0eb17ec0be8726901b4753ec290e2961f
                                          • Instruction ID: d7fee10976a68046a7b83d2e805af0cd2f57f965cceba961e5fbb40cf31af373
                                          • Opcode Fuzzy Hash: 09fa889b29638d1078b03d6b42bbf8f0eb17ec0be8726901b4753ec290e2961f
                                          • Instruction Fuzzy Hash: D021F271608200DFCB14DF24D9C4B26BFA6EB89318F20C569D84A5F696C33AE847CA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aab94af788ec45852a1a0e2b5e0dd3235c28a506447981819d82e9f3d0ff0dc8
                                          • Instruction ID: 21755c169f211bce73123b5912b1e403e1f0bafa00a5570d659b72acd1651c00
                                          • Opcode Fuzzy Hash: aab94af788ec45852a1a0e2b5e0dd3235c28a506447981819d82e9f3d0ff0dc8
                                          • Instruction Fuzzy Hash: 192116B4D08209CFCB40CFE9C5919EEBBF6EB49321F6051AAD819A7312C7309A41CF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e2585b7d3d78ada0d0cc8dbb1eb6472731781000358b69fbde20f4872e825093
                                          • Instruction ID: 8758f60139b184dfff8013cd25f7c734b82f318901318a13eb5e6856c22ef11e
                                          • Opcode Fuzzy Hash: e2585b7d3d78ada0d0cc8dbb1eb6472731781000358b69fbde20f4872e825093
                                          • Instruction Fuzzy Hash: 82215B75E0011A8BCB40DBE8C9406FEB7BAFF89302F108569D415B7395DB346E85CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a2461017aa83369e564b1e0a1dcb2aca2cf559d44b2e217e9791df350765a62
                                          • Instruction ID: 8f7b5272487f47e235b0a2f317203869f252b8ebe17ae26559b5cfe5d1baeb84
                                          • Opcode Fuzzy Hash: 3a2461017aa83369e564b1e0a1dcb2aca2cf559d44b2e217e9791df350765a62
                                          • Instruction Fuzzy Hash: D731BFB0D01218DFDB20DFDAC988B8EBBF5BB48315F24845AE404BB250C7B55885CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 22ab5feb7f4f036500713829b5816d1c5de700be07a4252b5210cc3da3402607
                                          • Instruction ID: bc03bb838dfc293a7515bf6577b0776b2efbc7a4e4dd17bbb8efd6902ef46545
                                          • Opcode Fuzzy Hash: 22ab5feb7f4f036500713829b5816d1c5de700be07a4252b5210cc3da3402607
                                          • Instruction Fuzzy Hash: 2B31C2B4D01258DFDB20DFD9C988B9DBBF5BB48314F148459E404BB250C7B55845CB94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1b5a1703d8d18452c11dafc444b7f300219ceb1ee457145862df6b0bc67f913
                                          • Instruction ID: 96d2454936d2ceeaf8637e16a500971bce46bfc985c74411ff6fa3b2f2943e09
                                          • Opcode Fuzzy Hash: f1b5a1703d8d18452c11dafc444b7f300219ceb1ee457145862df6b0bc67f913
                                          • Instruction Fuzzy Hash: 43214775A0021A8BCB40DBE8C9406FEB7BAEF89301F108669D415B7395DB306E85CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfe22c6e6af108ed5732b62bddcd5c25d3b190968ebd92c71ea797e25cc3f992
                                          • Instruction ID: e8c22911f9b957cd805af71a6f306a412bd52c536213c2062883eca1167def85
                                          • Opcode Fuzzy Hash: cfe22c6e6af108ed5732b62bddcd5c25d3b190968ebd92c71ea797e25cc3f992
                                          • Instruction Fuzzy Hash: A7217C31B44611CFD7298F98C905B7937B3AB85707F25C0AEE19A4F2A6CB3AC842C705
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04a8290e58b4216a9410d08b260f3b1d4f2be0588fc3137be7eda4647dec29c9
                                          • Instruction ID: 9506ad254a1950f8087613b84afce2c79f0de935c1bb8650076e787a11b7e0aa
                                          • Opcode Fuzzy Hash: 04a8290e58b4216a9410d08b260f3b1d4f2be0588fc3137be7eda4647dec29c9
                                          • Instruction Fuzzy Hash: A221E7B1D046188BEB18CF9BC8547EEBBB6BFC9311F14C06AD419A6255DB740949CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807871172.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_ead000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0fecab3f56438aef26605e51028ee205210c68ff79a9c9d74eb8f7527940260
                                          • Instruction ID: ec7583b9c6509263f0f0458e2a40f9cf728cb048542daed85adc9d1a422896f7
                                          • Opcode Fuzzy Hash: c0fecab3f56438aef26605e51028ee205210c68ff79a9c9d74eb8f7527940260
                                          • Instruction Fuzzy Hash: A82141755093808FDB12CF24D9D4715BF72EB46214F28C5DAD8498F6A7C33A980ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1020da461fde35864e0a434dfa010301f8964d2c4c4df4ff80e96c8dc8dea5a6
                                          • Instruction ID: 2c78ace405360c63100944dbf4cd24cf5e507bda05e6b25aa5de0479b3af526a
                                          • Opcode Fuzzy Hash: 1020da461fde35864e0a434dfa010301f8964d2c4c4df4ff80e96c8dc8dea5a6
                                          • Instruction Fuzzy Hash: 9B11C134B0021A8BDB589ABAA80067F76E7EB84712F108529E816D7390EE708D0187D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 74e0e56685b630ff40de9256855315982f6ea9024a4273f9ec98c464d169957f
                                          • Instruction ID: 7deedb774b8ab2c6dfc22e5845f1f040d32fef643375f2de5db23e8c61d9a7a1
                                          • Opcode Fuzzy Hash: 74e0e56685b630ff40de9256855315982f6ea9024a4273f9ec98c464d169957f
                                          • Instruction Fuzzy Hash: E311A0B9A006059F9B11EAB98C405BFBBF7EBC5261724452DD415E7340EB709D0687A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ec55072f3d26ed41390db4ca4c78e5af01e41746c962104a7eb6d0c1b4f0ee11
                                          • Instruction ID: 82bee00cf5e700f81eb6768a5757401147ad2ca1b35441c0dd3e38ee92bef817
                                          • Opcode Fuzzy Hash: ec55072f3d26ed41390db4ca4c78e5af01e41746c962104a7eb6d0c1b4f0ee11
                                          • Instruction Fuzzy Hash: 2A11AC31740601DFD7284E88C901B7937B3AB85703F25C0AEE0AA4F2A2CB3AC882C705
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f4d654e386788c7208873fb4667de2dfb31e76ec068e04e424f5343862c7f3a8
                                          • Instruction ID: f0105f60a7a9b40c51e03b3d566e43d458971d4965510077088480e63eca4905
                                          • Opcode Fuzzy Hash: f4d654e386788c7208873fb4667de2dfb31e76ec068e04e424f5343862c7f3a8
                                          • Instruction Fuzzy Hash: F721EAB4E08209DFCB40CFD9C191AAEBBF6EB48311F60906AD819A7715D7309A40CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07460285e61ec34a95f34eef9114053d0a20e05ce724ceff6a059d6386ea81c5
                                          • Instruction ID: 5b8d9e0b4703a06736282016f23e1125bda3dd573ecd06f93d82c9f0b6f38f5f
                                          • Opcode Fuzzy Hash: 07460285e61ec34a95f34eef9114053d0a20e05ce724ceff6a059d6386ea81c5
                                          • Instruction Fuzzy Hash: 961146B8D08208DFCB00DFA9C4528ADBFF6EF4A321F0592D9D458AB222D7309A45CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1747c0481631a8dbcaf88cd78560b5507bb060c25309401dc9fe48cdd9f18f7b
                                          • Instruction ID: 498ac1fc457a74c818a78604ec119a125345c6ce484dd069ac0995a5d7431ab7
                                          • Opcode Fuzzy Hash: 1747c0481631a8dbcaf88cd78560b5507bb060c25309401dc9fe48cdd9f18f7b
                                          • Instruction Fuzzy Hash: CC21D3B0D046188BEB18CFABC8547EEFAF7AFC8311F14C06AD419A6254DB7409498F90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d37d056724aede8b2354edf584247b1ae84e6481982a982fe65103b6f3ca7681
                                          • Instruction ID: 057d2f40f01d6451bc42e5717721797e0dfb5989e8f52ae9714968881c2a5864
                                          • Opcode Fuzzy Hash: d37d056724aede8b2354edf584247b1ae84e6481982a982fe65103b6f3ca7681
                                          • Instruction Fuzzy Hash: DD2114B59003499FCB10CF9AC844ADEBBF9FF48350F14842AE929A7210D375A954CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807821469.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_e9d000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: dc4809fb5d0942b7945b0249c5f9bf69af0d5c160a399ef89d253f91a1cd0b5f
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: F5110372404240DFCF12CF00D9C4B16BF71FB94328F24C2A9D8090B256C33AE85ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df2cddb202962a02beae63b257288bc356d09188e9d3ea35d06274d4e14ca08c
                                          • Instruction ID: d697ac289851a09d04304a2acc5c130e9bbe7352fa6ecb5a206a7a6931192ad0
                                          • Opcode Fuzzy Hash: df2cddb202962a02beae63b257288bc356d09188e9d3ea35d06274d4e14ca08c
                                          • Instruction Fuzzy Hash: 5B2114B5D002499FCB10CFAAD884ADEBFF5FB48350F14851AE919A7210C375A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe1c0ee72a0f37ed5cfc4d8d765e801b62af6b9299243599483aa4a06ccce14b
                                          • Instruction ID: e73672c549fd3c7c2520f756f2f9a6e4dbfa02af8be0327dbe5cfd6815a48518
                                          • Opcode Fuzzy Hash: fe1c0ee72a0f37ed5cfc4d8d765e801b62af6b9299243599483aa4a06ccce14b
                                          • Instruction Fuzzy Hash: F921F834A0431ACFD750DF68DD547A9B7B2EF86202F1081D9A849A731ACF744E85CF12
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807871172.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_ead000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 66bb58ff638e6b690e00feda8d452ed617824cbfed08503b02d3fb941343ee5b
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: 4D11D075508240CFCB01CF50D9C4B15BFB1FB49318F24C6A9D80A4F666C33AE80ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 23de89283777fd5054941c69430a2c70075bd2c2c02b8129c87428edf9eca5eb
                                          • Instruction ID: 6ab5d172cf25cd6c99293981e7fc0d924294def7f6aeda580a6812e826f1c939
                                          • Opcode Fuzzy Hash: 23de89283777fd5054941c69430a2c70075bd2c2c02b8129c87428edf9eca5eb
                                          • Instruction Fuzzy Hash: FA11D474A082488FCB40DFE8C554A9DBBB6FF4A301B109169D41AAF396D7386D06CF00
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5dfbb586ec410018c3214c4ef84109c2c05020dea86fd963c04809d01ed5f92d
                                          • Instruction ID: a3e46ef09f82a5770036c304f736de3de1b044eedae68810af92390f9f1b56e7
                                          • Opcode Fuzzy Hash: 5dfbb586ec410018c3214c4ef84109c2c05020dea86fd963c04809d01ed5f92d
                                          • Instruction Fuzzy Hash: 1B110075A04208EFDB04DFA8C984AADBBF9EF4D301F269499E4099B262D7309E00DB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a282e4b8c198133d27d527f0142f6fe16072538b4affa921d348c99b636f034
                                          • Instruction ID: 3691ff0ed22525adf02c865a73202a8acec2aa82abf95da392d4691d71b8363b
                                          • Opcode Fuzzy Hash: 3a282e4b8c198133d27d527f0142f6fe16072538b4affa921d348c99b636f034
                                          • Instruction Fuzzy Hash: 7801887094D244DFEB05CBA9C5409EDBFBAAF6A302B0691A9E406AB112D7318F45DB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 432b105be3edb7294a5c41d40750f5594686c04c33aa9ead98bd3a087355dfaf
                                          • Instruction ID: c9fac5e156c3f532c5c0d851b85af49ddce1e1f5f50c7d850a2b23546d948943
                                          • Opcode Fuzzy Hash: 432b105be3edb7294a5c41d40750f5594686c04c33aa9ead98bd3a087355dfaf
                                          • Instruction Fuzzy Hash: A611F5B59003488FCB20DF9AD844BDEBBF4EB48320F10841AD569A7250D775A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 684609b69934fc515297b386ea4c4ddbf5be16250ca504c2faf0ae802bf47a60
                                          • Instruction ID: 306ae52db86f98cf141e75e0d40d8ab29229e48fa4d922ce9364a2bfac778678
                                          • Opcode Fuzzy Hash: 684609b69934fc515297b386ea4c4ddbf5be16250ca504c2faf0ae802bf47a60
                                          • Instruction Fuzzy Hash: 841122B59002488FCB20DF9AC884B9EBBF4EB48320F10852AD569A73A0C774A544CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807821469.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_e9d000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2bf4dd0f221a4b671ceeab201ba4eee721ad9f2f596fe153605c2cc23757311
                                          • Instruction ID: 949078a2066e1f093a62332fcca8a4ad85fa8bbc5d007000ef0b62862c7f8e9c
                                          • Opcode Fuzzy Hash: b2bf4dd0f221a4b671ceeab201ba4eee721ad9f2f596fe153605c2cc23757311
                                          • Instruction Fuzzy Hash: EE01DB7500D3549AEB104AA5CDC47A7FFD8EF41364F18C52BED095B196C279DC40C6B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc47d398b9c596ec355d1037d61539ab4c088d9d8f2b03b042f5123fd0577f12
                                          • Instruction ID: f1db400c2be90683ea299447daf9fd3276f020e31633e374c120450cca21abdd
                                          • Opcode Fuzzy Hash: cc47d398b9c596ec355d1037d61539ab4c088d9d8f2b03b042f5123fd0577f12
                                          • Instruction Fuzzy Hash: BA11EC34905515CFD724DFA8DD88A9DBBB6FB49301F0491AAE40AA7352DF346D81CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f5fefe499344ac45bf2afeb4c52a6d2b5d98c52f78568d2787b67f5e8440aee
                                          • Instruction ID: ecb39f61a54b5c5f3af6bc16b93ad72f3f6c6467427445f467d588af42eba68a
                                          • Opcode Fuzzy Hash: 6f5fefe499344ac45bf2afeb4c52a6d2b5d98c52f78568d2787b67f5e8440aee
                                          • Instruction Fuzzy Hash: D4F096767001086FDB04DF9AD8408AEBBFBEFC4315704C066E518DB318DA31D9058B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5fb33e7e1a472955b78076be3b4e24305cc62143409c97d336470332c2c8f59
                                          • Instruction ID: 7ebac23656e02d39328fb2e7d41ae7d5aad15f91e45cdc7c44796453793f62aa
                                          • Opcode Fuzzy Hash: c5fb33e7e1a472955b78076be3b4e24305cc62143409c97d336470332c2c8f59
                                          • Instruction Fuzzy Hash: 27F03170948208DBE704CBA9C5409ADBBFAAF99302F15E1A9E40A6B212D7319A85DB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8b4488e1ebf1845cafd345f81d9464a71a93063e448daf5cbb22f3c7db8bcfc4
                                          • Instruction ID: 4bec3e3647ef795c8bb049de804f1ad1f93190cdc53dd336b5f6c17c5eefe292
                                          • Opcode Fuzzy Hash: 8b4488e1ebf1845cafd345f81d9464a71a93063e448daf5cbb22f3c7db8bcfc4
                                          • Instruction Fuzzy Hash: E3F0C276A001087FDB04DF9ADC4099E7BFBEBC4310B04C07AE918D7355EA30D9018B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9747483479fff0f820109c327b0cee7b9e74b05ced1163f7e8be7d8f38688e2
                                          • Instruction ID: 8d24bc374c5826461865c107ea3ba504d4d778b696c276eb75d69653d3f2d8b0
                                          • Opcode Fuzzy Hash: f9747483479fff0f820109c327b0cee7b9e74b05ced1163f7e8be7d8f38688e2
                                          • Instruction Fuzzy Hash: 03012D34905115CFD710DFA8DD446ECB7B2FB88201F00519AD80EA7346DB345D81CF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1807dca5ae126e1de16825a5d1430dcd8aa61eedb411bb42eca46916a5aa6605
                                          • Instruction ID: 606a57ba09512510c0f53a248ffbc3d06d7b9dd00707798b21dbb17d02ab6921
                                          • Opcode Fuzzy Hash: 1807dca5ae126e1de16825a5d1430dcd8aa61eedb411bb42eca46916a5aa6605
                                          • Instruction Fuzzy Hash: 5901DA71900219DFEB14DFDAC8047AEBAF6BF48365F158269E424AB2A0D7744A40CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1fc4cd736e9d30be24aecc27b8bddc0b88384cce0350e4eeda5412e9c9ae84e6
                                          • Instruction ID: bacfe20f24f164575fa2ce0b35e72640fd5b6130013d687d287232466a9c5ea5
                                          • Opcode Fuzzy Hash: 1fc4cd736e9d30be24aecc27b8bddc0b88384cce0350e4eeda5412e9c9ae84e6
                                          • Instruction Fuzzy Hash: A6F082B27041142FE3149A6EDC89E2BBBEDEBC96707158179F518D7351DD709C00C6A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1807821469.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_e9d000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 174b7544bc641a5746da5531112224aeca0c1dbf2d3c22c43fcc3d443101468b
                                          • Instruction ID: 8658ac2f8a751b4a3d564a82a1fa272caa918c4cb060e72df4d875744f548da8
                                          • Opcode Fuzzy Hash: 174b7544bc641a5746da5531112224aeca0c1dbf2d3c22c43fcc3d443101468b
                                          • Instruction Fuzzy Hash: 48F0F675008354AEEB108A16CCC4BA2FFE8EF90378F18C45BED085F282C2799C40CAB0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1c0a561aa43857e40c300b8fcd68d586f919758bd07caf43fc76af056428761
                                          • Instruction ID: 994ad9b1e5846a1bc8f4430ba9a2eb2981dc06134bc9eea731581362adf80528
                                          • Opcode Fuzzy Hash: d1c0a561aa43857e40c300b8fcd68d586f919758bd07caf43fc76af056428761
                                          • Instruction Fuzzy Hash: D6F0E972D003048BDB209BEE9404396BBF69F91325F1881AEC4599B261E63AD409CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40034d4407bdee099fc609ffebc145bc1bbc0cc3f478b6ad8d151a5138170ea2
                                          • Instruction ID: a3739674806ba88aed51b600355c0cc8e5f73364dde689529a40e7bb7bb14105
                                          • Opcode Fuzzy Hash: 40034d4407bdee099fc609ffebc145bc1bbc0cc3f478b6ad8d151a5138170ea2
                                          • Instruction Fuzzy Hash: 9201BB70800219DFEB14DFEAC8447AEBBF6FF48355F148669E824AB2A0D7744A44CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f8babe0f20f15eadd1c088f5da09ec5c4d59f99e5230080c7addb9fd585b5acc
                                          • Instruction ID: 6c6bdd0372f4938d4144f4f4863ee86acb212d7f9bba0ce31bdb3256a5190c42
                                          • Opcode Fuzzy Hash: f8babe0f20f15eadd1c088f5da09ec5c4d59f99e5230080c7addb9fd585b5acc
                                          • Instruction Fuzzy Hash: A4E039B27041286F93049A6ED884C6BBBEDEBCC660311807AF508C7310D9319C0086A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aea9bbf008f6782b30a4a6772e00fadec27dfe11f61e6c1ed9dbff14b265487f
                                          • Instruction ID: 28e7d455959fabb7a1ec68a0ed39d4a0e6bce3ba456f2252a6879ef24da91db2
                                          • Opcode Fuzzy Hash: aea9bbf008f6782b30a4a6772e00fadec27dfe11f61e6c1ed9dbff14b265487f
                                          • Instruction Fuzzy Hash: 11F044B0D0424A9FDB44DFA8C841AAEBFF1BF09200F0284A9D800EB241E7B48601CFE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b7819993f393b62b0e617b83e42107559c1b27cd7e0e90f4ef01ce8daef5bb62
                                          • Instruction ID: 99fa7b3d88b00f8a80694c15569e19495c01de11885c7b797ec9629f81fe182c
                                          • Opcode Fuzzy Hash: b7819993f393b62b0e617b83e42107559c1b27cd7e0e90f4ef01ce8daef5bb62
                                          • Instruction Fuzzy Hash: 2701E834905205CFD724DBA8DE487A9BBB2FB89201F0491AAD80EA7356DB385D82CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 000a6b6baef9af7960dd81eb252d792c573d91d1798f7106abf978af82441603
                                          • Instruction ID: 88b9b8a5649694c358c6236b3aa01e0fb4006d53e95e826ccf87fbcb7367e143
                                          • Opcode Fuzzy Hash: 000a6b6baef9af7960dd81eb252d792c573d91d1798f7106abf978af82441603
                                          • Instruction Fuzzy Hash: 30F0B7B0D0420A9FDB44DFA9C841AAEBBF5BF48700F5185AAD918E7341E77496018B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 50b0fa0d926447f73b805bfad7260ab79f98e687a1b2d2dd7fbc5ff802e1de14
                                          • Instruction ID: 51f4b89f094c83ba887d1b56ab65c7ec103dc830b3b5e3574da49ef8e9d45daf
                                          • Opcode Fuzzy Hash: 50b0fa0d926447f73b805bfad7260ab79f98e687a1b2d2dd7fbc5ff802e1de14
                                          • Instruction Fuzzy Hash: 2DF09236A05508DFDB00EFB4E98669CB7B5EF85304B3281E8D804A7205EB326F12DF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f4f1e085695b105df2f0e6be582de8d03bc6faa3a89333d8cf5bf7bbd355c1e2
                                          • Instruction ID: 37c632edb643fbcd70c9e3cfa26e98976c6f10805a6f00affd082d514471284d
                                          • Opcode Fuzzy Hash: f4f1e085695b105df2f0e6be582de8d03bc6faa3a89333d8cf5bf7bbd355c1e2
                                          • Instruction Fuzzy Hash: D8F0A574E00208ABCF44EFA8D845A9DBBB6EB88311F10C1A9E924A3350DA356A50DF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bacc15624b0ccccde340e01df565d5c66dcff4506093e3cbb6d21bcae7566336
                                          • Instruction ID: 57f8f8dd448dd684d70256d856f1e82643149faca2b43fe59af7fe4c19f01e95
                                          • Opcode Fuzzy Hash: bacc15624b0ccccde340e01df565d5c66dcff4506093e3cbb6d21bcae7566336
                                          • Instruction Fuzzy Hash: 8DE09B70A44246DED310CF6DC54464DBFF16F04364F29C1A4C054DF162DB7491069B81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cefd9f74d2b19ba46fd6d3fb94446d5e1d95c49ca1704a62d958a4ba2b94195e
                                          • Instruction ID: 7ebcf5935cec842a110d1701b5785cd8254042ed115492ac2e7f2cf13b8520f9
                                          • Opcode Fuzzy Hash: cefd9f74d2b19ba46fd6d3fb94446d5e1d95c49ca1704a62d958a4ba2b94195e
                                          • Instruction Fuzzy Hash: F5E08635A0050CEFDB04EFA4E90245CB7B9EB84300721C194D80593314EB326F009B50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2ef0328a04308b05b15ac566969f590df9d595bacf9cb8146134858bb34b83c
                                          • Instruction ID: ceee8f3fa5a4973e979ea2f32b476169cdd33dac81e52b82f73a40d9c29d9dc9
                                          • Opcode Fuzzy Hash: d2ef0328a04308b05b15ac566969f590df9d595bacf9cb8146134858bb34b83c
                                          • Instruction Fuzzy Hash: 2EE0B6B0E4020ADFD740EFBDC945A5EBBF1BF08200F1185A9D019E7211EBB496048F91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1522e2be80e19f5ddca52f4fb3446a07ac2b6fea5597935588b8ecace2411fed
                                          • Instruction ID: ae45b17c41c897eebd06a6fa3faa01fe35b04a54b2761d4ef618517341e217a0
                                          • Opcode Fuzzy Hash: 1522e2be80e19f5ddca52f4fb3446a07ac2b6fea5597935588b8ecace2411fed
                                          • Instruction Fuzzy Hash: E2E04F3490520ACFDB00EBD8C9549FDBBBBFB84301B008519D405D731ACB744C46CB94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3bff4e85811ea29ece8665eebd50109b78f92741c27a08106321d89808df69f
                                          • Instruction ID: 6d7b43020432bd391dc0e2fb665fd6ee8f75a73824bb4deb9a62c0dc1d9d84ea
                                          • Opcode Fuzzy Hash: f3bff4e85811ea29ece8665eebd50109b78f92741c27a08106321d89808df69f
                                          • Instruction Fuzzy Hash: 93E01730109210CFC764DBE8C968AB8377AFB4E333F000299D41E662A2CB369A85CF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: debbd2c8d6c095765be2531751cab1f9d32f70d740e0c7f4830a70729f117bf4
                                          • Instruction ID: b2287375cdd5161f6db5b11ad9d58f2e1e8d400d0707a81266c215b99bac3748
                                          • Opcode Fuzzy Hash: debbd2c8d6c095765be2531751cab1f9d32f70d740e0c7f4830a70729f117bf4
                                          • Instruction Fuzzy Hash: 31D01730808215CFC724DBE9DC649FDB33ABB8A223F449256C02E62196DB300804CF20
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c8e4daeeb02b1098b4194529d8c1839c0f1ceb4d9eff6e5a0bf8e0e630564164
                                          • Instruction ID: 88b03e255a41e078fd3ab967efc953a06ab6384ccc3aad06bb720491baae8294
                                          • Opcode Fuzzy Hash: c8e4daeeb02b1098b4194529d8c1839c0f1ceb4d9eff6e5a0bf8e0e630564164
                                          • Instruction Fuzzy Hash: FCC08CF31400004FF3041A808845AB4B7C2FB68229B629012D14A261A12822E8126602
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 97c48e058d6676cd6c0ab9f206464c9f0f040edf936c830090e5cd3572e37f7d
                                          • Instruction ID: 46ea524a32d0718f5aa4180385e3ea39f3c26c0581ab125df69a2230df2408be
                                          • Opcode Fuzzy Hash: 97c48e058d6676cd6c0ab9f206464c9f0f040edf936c830090e5cd3572e37f7d
                                          • Instruction Fuzzy Hash: B3D0C971104210CFD354DBA4D994AA83776FB8E323F014499D00E67212CB36ED84CF10
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 53c7c665ef0205cad7739e076ab0db7f226e4496818f813786351fd384d606ed
                                          • Instruction ID: db74479cad2e61466208b071b90850aa22b495f6f483a2c3663b3fe02ad7cfe2
                                          • Opcode Fuzzy Hash: 53c7c665ef0205cad7739e076ab0db7f226e4496818f813786351fd384d606ed
                                          • Instruction Fuzzy Hash: 46C09BFB854905E5E50066D0CD05F55502BD774757F584574525AD01A0E162C016D51E
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9cef10481103a2dfd3c2fc7115c790519635eb1d7cb51837efd87ca0d0aba3d
                                          • Instruction ID: 2df46df43a43342eb5f2e8e4b760ad395fc6d86e3a9d75c51b7cdcbd87345698
                                          • Opcode Fuzzy Hash: b9cef10481103a2dfd3c2fc7115c790519635eb1d7cb51837efd87ca0d0aba3d
                                          • Instruction Fuzzy Hash: 8AC08C301412068BC65427E8BC0C3E57AA8D700326F004028A52882422CFA84440CA66
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.1813690720.00000000080A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 080A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_80a0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dec9e08827f9683a7b233bdc530241f7e321f5c808555b2487f298e5a9a9aa49
                                          • Instruction ID: 2d8bcd2ba5028b66476f12c70a5fd60a8030f068e47af3d423531ca4fe08b6f1
                                          • Opcode Fuzzy Hash: dec9e08827f9683a7b233bdc530241f7e321f5c808555b2487f298e5a9a9aa49
                                          • Instruction Fuzzy Hash: F8C00230A46629CFDB20DB6CDA84BE8B7B6EB45301F0055E4D50DA626AD7305E84DF01
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:8.2%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:42
                                          Total number of Limit Nodes:6
                                          execution_graph 49711 71c8788 49713 71c8798 49711->49713 49712 71c879d 49713->49712 49717 16c1040 49713->49717 49722 16c1050 49713->49722 49714 71c87d9 49719 16c1050 49717->49719 49718 16c1176 49718->49714 49719->49718 49720 6f1fa00 GlobalMemoryStatusEx 49719->49720 49721 6f1f9ef GlobalMemoryStatusEx 49719->49721 49720->49719 49721->49719 49724 16c106c 49722->49724 49723 16c1176 49723->49714 49724->49723 49725 6f1fa00 GlobalMemoryStatusEx 49724->49725 49726 6f1f9ef GlobalMemoryStatusEx 49724->49726 49725->49724 49726->49724 49727 71c8a88 49728 71c8aa4 49727->49728 49729 71c8b09 49728->49729 49731 71c8b60 49728->49731 49732 71c8b85 49731->49732 49733 6f1fa00 GlobalMemoryStatusEx 49732->49733 49734 6f1f9ef GlobalMemoryStatusEx 49732->49734 49735 71c8c0f 49733->49735 49734->49735 49735->49729 49694 18d8348 49695 18d8352 49694->49695 49696 18d836c 49695->49696 49699 6f1fa00 49695->49699 49703 6f1f9ef 49695->49703 49701 6f1fa15 49699->49701 49700 6f1fc2a 49700->49696 49701->49700 49702 6f1fc49 GlobalMemoryStatusEx 49701->49702 49702->49701 49705 6f1fa15 49703->49705 49704 6f1fc2a 49704->49696 49705->49704 49706 6f1fc49 GlobalMemoryStatusEx 49705->49706 49706->49705 49736 71c60e0 PeekMessageW 49737 71c6157 49736->49737 49707 71c5bd1 49709 71c5c01 49707->49709 49708 71c5fe0 WaitMessage 49708->49709 49709->49708 49710 71c5c8c 49709->49710 49738 18d8170 49739 18d81b6 DeleteFileW 49738->49739 49741 18d81ef 49739->49741

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 6f13460-6f13481 1 6f13483-6f13486 0->1 2 6f13488-6f134a7 1->2 3 6f134ac-6f134af 1->3 2->3 4 6f13c50-6f13c52 3->4 5 6f134b5-6f134d4 3->5 6 6f13c54 4->6 7 6f13c59-6f13c5c 4->7 13 6f134d6-6f134d9 5->13 14 6f134ed-6f134f7 5->14 6->7 7->1 10 6f13c62-6f13c6b 7->10 13->14 15 6f134db-6f134eb 13->15 18 6f134fd-6f1350c 14->18 15->18 129 6f1350e call 6f13c80 18->129 130 6f1350e call 6f13c7f 18->130 19 6f13513-6f13518 20 6f13525-6f13802 19->20 21 6f1351a-6f13520 19->21 42 6f13c42-6f13c4f 20->42 43 6f13808-6f138b7 20->43 21->10 52 6f138e0 43->52 53 6f138b9-6f138de 43->53 55 6f138e9-6f138fc call 6f1235c 52->55 53->55 58 6f13902-6f13924 call 6f12368 55->58 59 6f13c29-6f13c35 55->59 58->59 63 6f1392a-6f13934 58->63 59->43 61 6f13c3b 59->61 61->42 63->59 64 6f1393a-6f13945 63->64 64->59 65 6f1394b-6f13a21 64->65 77 6f13a23-6f13a25 65->77 78 6f13a2f-6f13a5f 65->78 77->78 82 6f13a61-6f13a63 78->82 83 6f13a6d-6f13a79 78->83 82->83 84 6f13ad9-6f13add 83->84 85 6f13a7b-6f13a7f 83->85 86 6f13ae3-6f13b1f 84->86 87 6f13c1a-6f13c23 84->87 85->84 88 6f13a81-6f13aab 85->88 100 6f13b21-6f13b23 86->100 101 6f13b2d-6f13b3b 86->101 87->59 87->65 95 6f13ab9-6f13ad6 call 6f12374 88->95 96 6f13aad-6f13aaf 88->96 95->84 96->95 100->101 103 6f13b52-6f13b5d 101->103 104 6f13b3d-6f13b48 101->104 108 6f13b75-6f13b86 103->108 109 6f13b5f-6f13b65 103->109 104->103 107 6f13b4a 104->107 107->103 113 6f13b88-6f13b8e 108->113 114 6f13b9e-6f13baa 108->114 110 6f13b67 109->110 111 6f13b69-6f13b6b 109->111 110->108 111->108 115 6f13b90 113->115 116 6f13b92-6f13b94 113->116 118 6f13bc2-6f13c13 114->118 119 6f13bac-6f13bb2 114->119 115->114 116->114 118->87 120 6f13bb4 119->120 121 6f13bb6-6f13bb8 119->121 120->118 121->118 129->19 130->19
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: b65a7c2ab294bf76451055663900ecbd3dd26d9c537113920e45ff945e93c8aa
                                          • Instruction ID: f41ef583fa62cdf29c97fb3391ba45e66367fb78d6d1a664e225c72f893f0a5c
                                          • Opcode Fuzzy Hash: b65a7c2ab294bf76451055663900ecbd3dd26d9c537113920e45ff945e93c8aa
                                          • Instruction Fuzzy Hash: 9F324F35E1061ACFDB14EF75D99459DB7B2FFC9300F208669D409AB264EB70AD85CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1122 71c5bd1-71c5c08 1124 71c5c0e-71c5c22 1122->1124 1125 71c6039 1122->1125 1126 71c5c24-71c5c4e 1124->1126 1127 71c5c51-71c5c70 1124->1127 1128 71c603e-71c6054 1125->1128 1126->1127 1134 71c5c88-71c5c8a 1127->1134 1135 71c5c72-71c5c78 1127->1135 1139 71c5c8c-71c5ca4 1134->1139 1140 71c5ca9-71c5cb2 1134->1140 1137 71c5c7c-71c5c7e 1135->1137 1138 71c5c7a 1135->1138 1137->1134 1138->1134 1139->1128 1141 71c5cba-71c5cc1 1140->1141 1142 71c5ccb-71c5cd2 1141->1142 1143 71c5cc3-71c5cc9 1141->1143 1145 71c5cdc 1142->1145 1146 71c5cd4-71c5cda 1142->1146 1144 71c5cdf-71c5cf5 call 71c4ba8 1143->1144 1148 71c5cfa-71c5cfc 1144->1148 1145->1144 1146->1144 1149 71c5e51-71c5e55 1148->1149 1150 71c5d02-71c5d09 1148->1150 1152 71c5e5b-71c5e5f 1149->1152 1153 71c6024-71c6037 1149->1153 1150->1125 1151 71c5d0f-71c5d4c 1150->1151 1161 71c601a-71c601e 1151->1161 1162 71c5d52-71c5d57 1151->1162 1154 71c5e79-71c5e82 1152->1154 1155 71c5e61-71c5e74 1152->1155 1153->1128 1156 71c5e84-71c5eae 1154->1156 1157 71c5eb1-71c5eb8 1154->1157 1155->1128 1156->1157 1159 71c5ebe-71c5ec5 1157->1159 1160 71c5f57-71c5f6c 1157->1160 1164 71c5ef4-71c5f16 1159->1164 1165 71c5ec7-71c5ef1 1159->1165 1160->1161 1174 71c5f72-71c5f74 1160->1174 1161->1141 1161->1153 1166 71c5d89-71c5d9e call 71c4bcc 1162->1166 1167 71c5d59-71c5d67 call 71c4bb4 1162->1167 1164->1160 1202 71c5f18-71c5f22 1164->1202 1165->1164 1172 71c5da3-71c5da7 1166->1172 1167->1166 1181 71c5d69-71c5d87 call 71c4bc0 1167->1181 1177 71c5e18-71c5e25 1172->1177 1178 71c5da9-71c5dbb call 71c4bd8 1172->1178 1179 71c5f76-71c5faf 1174->1179 1180 71c5fc1-71c5fde call 71c4ba8 1174->1180 1177->1161 1194 71c5e2b-71c5e35 call 71c4be8 1177->1194 1205 71c5dbd-71c5ded 1178->1205 1206 71c5dfb-71c5e13 1178->1206 1197 71c5fb8-71c5fbf 1179->1197 1198 71c5fb1-71c5fb7 1179->1198 1180->1161 1193 71c5fe0-71c600c WaitMessage 1180->1193 1181->1172 1199 71c600e 1193->1199 1200 71c6013 1193->1200 1208 71c5e44-71c5e4c call 71c4c00 1194->1208 1209 71c5e37-71c5e3f call 71c4bf4 1194->1209 1197->1161 1198->1197 1199->1200 1200->1161 1213 71c5f3a-71c5f55 1202->1213 1214 71c5f24-71c5f2a 1202->1214 1220 71c5def 1205->1220 1221 71c5df4 1205->1221 1206->1128 1208->1161 1209->1161 1213->1160 1213->1202 1218 71c5f2c 1214->1218 1219 71c5f2e-71c5f30 1214->1219 1218->1213 1219->1213 1220->1221 1221->1206
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 854506dc5dc392040d63468b0c050ebb78cba2f4311a8f0b9871e0d4c4336813
                                          • Instruction ID: b21ab900b7f37350c8c1481b4dff21a2447e91ec793d45b0438b0c50f02e6e50
                                          • Opcode Fuzzy Hash: 854506dc5dc392040d63468b0c050ebb78cba2f4311a8f0b9871e0d4c4336813
                                          • Instruction Fuzzy Hash: 6FD16CB0A0020ACFEB15DFE5C948BADBBF2BF58314F258158E405AF2A4DB74E955CB41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 131 6f19108-6f1912d 132 6f1912f-6f19132 131->132 133 6f199f0-6f199f3 132->133 134 6f19138-6f1914d 132->134 135 6f199f5-6f19a14 133->135 136 6f19a19-6f19a1b 133->136 142 6f19165-6f1917b 134->142 143 6f1914f-6f19155 134->143 135->136 137 6f19a22-6f19a25 136->137 138 6f19a1d 136->138 137->132 141 6f19a2b-6f19a35 137->141 138->137 148 6f19186-6f19188 142->148 144 6f19157 143->144 145 6f19159-6f1915b 143->145 144->142 145->142 149 6f191a0-6f19211 148->149 150 6f1918a-6f19190 148->150 161 6f19213-6f19236 149->161 162 6f1923d-6f19259 149->162 151 6f19192 150->151 152 6f19194-6f19196 150->152 151->149 152->149 161->162 167 6f19285-6f192a0 162->167 168 6f1925b-6f1927e 162->168 173 6f192a2-6f192c4 167->173 174 6f192cb-6f192e6 167->174 168->167 173->174 179 6f192e8-6f19304 174->179 180 6f1930b-6f19319 174->180 179->180 181 6f19329-6f193a3 180->181 182 6f1931b-6f19324 180->182 188 6f193f0-6f19405 181->188 189 6f193a5-6f193c3 181->189 182->141 188->133 193 6f193c5-6f193d4 189->193 194 6f193df-6f193ee 189->194 193->194 194->188 194->189
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: 2556eec92e297e30de532c74ad14071cc020aa8915235cf8b09a43cca637dbdc
                                          • Instruction ID: d3d9ad884431f99c4bf683cc1ecba08d7cc3448dfd8f83bcdf52b869f62db10f
                                          • Opcode Fuzzy Hash: 2556eec92e297e30de532c74ad14071cc020aa8915235cf8b09a43cca637dbdc
                                          • Instruction Fuzzy Hash: 9E915074F1020A8FDB64DF65D9607AEB7FAEBC4240F108569D409EB394EB74DC418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 197 16c07f8-16c081d 198 16c0972-16c0996 197->198 199 16c0823-16c0825 197->199 200 16c099d-16c0a22 198->200 199->200 201 16c082b-16c0834 199->201 235 16c0a28-16c0a3b 200->235 236 16c0ae3 200->236 203 16c0836-16c0844 201->203 204 16c0847-16c086e 201->204 203->204 205 16c08f8-16c08fc 204->205 206 16c0874-16c0887 call 16c04f4 204->206 209 16c08fe-16c092b call 16c0504 205->209 210 16c0933-16c094c 205->210 206->205 223 16c0889-16c08dc 206->223 227 16c0930 209->227 216 16c094e 210->216 217 16c0956-16c0957 210->217 216->217 217->198 223->205 229 16c08de-16c08f1 223->229 227->210 229->205 235->236 241 16c0a41-16c0a4d 235->241 238 16c0ae8-16c0af3 236->238 242 16c0afa-16c0b23 238->242 241->238 245 16c0a53-16c0a7e 241->245 246 16c0b2f-16c0c04 242->246 247 16c0b25-16c0b2e 242->247 245->236 254 16c0a80-16c0a8c 245->254 267 16c0c0a-16c0c18 246->267 256 16c0a8e-16c0a91 254->256 257 16c0ad8-16c0ae2 254->257 259 16c0a94-16c0a9d 256->259 259->242 261 16c0a9f-16c0aba 259->261 262 16c0abc-16c0abe 261->262 263 16c0ac2-16c0ac5 261->263 262->236 265 16c0ac0 262->265 263->236 266 16c0ac7-16c0ad6 263->266 265->266 266->257 266->259 269 16c0c1a-16c0c20 267->269 270 16c0c21-16c0c59 267->270 269->270 274 16c0c69 270->274 275 16c0c5b-16c0c5f 270->275 277 16c0c6a 274->277 275->274 276 16c0c61 275->276 276->274 277->277
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (oq$(oq$(oq
                                          • API String ID: 0-3965398577
                                          • Opcode ID: d73547939bf2585f4b5c8d96040293b24ffd22e685169e0c5d0d3d777522c435
                                          • Instruction ID: f08a35e3444f982bc54f905d37bc62c8eb54d89acf3236b8b76334240e88987b
                                          • Opcode Fuzzy Hash: d73547939bf2585f4b5c8d96040293b24ffd22e685169e0c5d0d3d777522c435
                                          • Instruction Fuzzy Hash: 27D18D74E00209DFDB14DFA9C8546AEBBF6EF88710F24866DE505AB391DB30AD41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 278 6f14b68-6f14b8c 279 6f14b8e-6f14b91 278->279 280 6f15270-6f15273 279->280 281 6f14b97-6f14c8f 279->281 282 6f15275-6f1528f 280->282 283 6f15294-6f15296 280->283 301 6f14d12-6f14d19 281->301 302 6f14c95-6f14ce2 call 6f15411 281->302 282->283 285 6f15298 283->285 286 6f1529d-6f152a0 283->286 285->286 286->279 288 6f152a6-6f152b3 286->288 303 6f14d9d-6f14da6 301->303 304 6f14d1f-6f14d8f 301->304 315 6f14ce8-6f14d04 302->315 303->288 321 6f14d91 304->321 322 6f14d9a 304->322 319 6f14d06 315->319 320 6f14d0f-6f14d10 315->320 319->320 320->301 321->322 322->303
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fpq$XPpq$\Opq
                                          • API String ID: 0-2571271785
                                          • Opcode ID: bd68fac892a09f42e828984073f9aa8ff44e166ade6ecb1ffaf873d92df1768a
                                          • Instruction ID: ed4468929104a1d2bfc7e98bbe32b25561d3138ddb0fa731e81ba3d5aa4ec1c5
                                          • Opcode Fuzzy Hash: bd68fac892a09f42e828984073f9aa8ff44e166ade6ecb1ffaf873d92df1768a
                                          • Instruction Fuzzy Hash: 9B616B71E002199FEF54DBA5D814BAEBBF7FF88340F20852AD506AB394DA758C41CB94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 979 6f18030-6f1804f 980 6f18051-6f18054 979->980 981 6f18077-6f1807a 980->981 982 6f18056-6f18072 980->982 983 6f18080-6f1808f 981->983 984 6f182af-6f182b2 981->984 982->981 991 6f18091-6f180ac 983->991 992 6f180ae-6f180f2 983->992 985 6f182b8-6f182c4 984->985 986 6f1835d-6f1835f 984->986 994 6f182cf-6f182d1 985->994 989 6f18361 986->989 990 6f18366-6f18369 986->990 989->990 990->980 993 6f1836f-6f18378 990->993 991->992 1005 6f18283-6f18299 992->1005 1006 6f180f8-6f18109 992->1006 996 6f182d3-6f182d9 994->996 997 6f182e9-6f182ed 994->997 1000 6f182db 996->1000 1001 6f182dd-6f182df 996->1001 1002 6f182fb 997->1002 1003 6f182ef-6f182f9 997->1003 1000->997 1001->997 1004 6f18300-6f18302 1002->1004 1003->1004 1007 6f18313-6f1834c 1004->1007 1008 6f18304-6f18307 1004->1008 1005->984 1014 6f1810f-6f1812c 1006->1014 1015 6f1826e-6f1827d 1006->1015 1007->983 1023 6f18352-6f1835c 1007->1023 1008->993 1014->1015 1021 6f18132-6f18228 call 6f16568 1014->1021 1015->1005 1015->1006 1047 6f18236 1021->1047 1048 6f1822a-6f18234 1021->1048 1049 6f1823b-6f1823d 1047->1049 1048->1049 1049->1015 1050 6f1823f-6f18244 1049->1050 1051 6f18252 1050->1051 1052 6f18246-6f18250 1050->1052 1053 6f18257-6f18259 1051->1053 1052->1053 1053->1015 1054 6f1825b-6f18267 1053->1054 1054->1015
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq
                                          • API String ID: 0-3550614674
                                          • Opcode ID: 693fe8382f5e09884ffdf12cba734cd25c864c182882e8041d9f85ca0b280644
                                          • Instruction ID: 432a8e10dd1cf3943eba130494f0c98ad8fe85833795c4f43dfb50c1da4baca4
                                          • Opcode Fuzzy Hash: 693fe8382f5e09884ffdf12cba734cd25c864c182882e8041d9f85ca0b280644
                                          • Instruction Fuzzy Hash: FD91CE34F006458FDB69DB75D65066EB3E6EF84380F248928D816DB398DB35EC86CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1056 6f19103-6f1912d 1057 6f1912f-6f19132 1056->1057 1058 6f199f0-6f199f3 1057->1058 1059 6f19138-6f1914d 1057->1059 1060 6f199f5-6f19a14 1058->1060 1061 6f19a19-6f19a1b 1058->1061 1067 6f19165-6f1917b 1059->1067 1068 6f1914f-6f19155 1059->1068 1060->1061 1062 6f19a22-6f19a25 1061->1062 1063 6f19a1d 1061->1063 1062->1057 1066 6f19a2b-6f19a35 1062->1066 1063->1062 1073 6f19186-6f19188 1067->1073 1069 6f19157 1068->1069 1070 6f19159-6f1915b 1068->1070 1069->1067 1070->1067 1074 6f191a0-6f19211 1073->1074 1075 6f1918a-6f19190 1073->1075 1086 6f19213-6f19236 1074->1086 1087 6f1923d-6f19259 1074->1087 1076 6f19192 1075->1076 1077 6f19194-6f19196 1075->1077 1076->1074 1077->1074 1086->1087 1092 6f19285-6f192a0 1087->1092 1093 6f1925b-6f1927e 1087->1093 1098 6f192a2-6f192c4 1092->1098 1099 6f192cb-6f192e6 1092->1099 1093->1092 1098->1099 1104 6f192e8-6f19304 1099->1104 1105 6f1930b-6f19319 1099->1105 1104->1105 1106 6f19329-6f193a3 1105->1106 1107 6f1931b-6f19324 1105->1107 1113 6f193f0-6f19405 1106->1113 1114 6f193a5-6f193c3 1106->1114 1107->1066 1113->1058 1118 6f193c5-6f193d4 1114->1118 1119 6f193df-6f193ee 1114->1119 1118->1119 1119->1113 1119->1114
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq
                                          • API String ID: 0-3550614674
                                          • Opcode ID: 125920490b7f79d9c5624b050d9e0558b56c2f93a1cd450d7892caba95d04e9c
                                          • Instruction ID: f7bc2711e65200dd2e158255874cfe9fe8b05dc3c6ee7137105f524c8491543c
                                          • Opcode Fuzzy Hash: 125920490b7f79d9c5624b050d9e0558b56c2f93a1cd450d7892caba95d04e9c
                                          • Instruction Fuzzy Hash: 00513E74F001068FEB54EB75D960B6E73FAEBC8680F508469D509DB398EA74DC42CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1224 18d8168-18d81ba 1227 18d81bc-18d81bf 1224->1227 1228 18d81c2-18d81ed DeleteFileW 1224->1228 1227->1228 1229 18d81ef-18d81f5 1228->1229 1230 18d81f6-18d821e 1228->1230 1229->1230
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 018D81E0
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2932435945.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_18d0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: f839e1d147b037f0ef68eae66146de7b4bafe1f6de8054dd60492d724b970433
                                          • Instruction ID: 66e1900de1a35ea5f53b01bdbed2c0f43ea6988be06fca9b1f9995a3194de4c2
                                          • Opcode Fuzzy Hash: f839e1d147b037f0ef68eae66146de7b4bafe1f6de8054dd60492d724b970433
                                          • Instruction Fuzzy Hash: A72158B1C0065A9FCB14CFAAC844BDEFBB4FF49320F14816AD958A7254D734AA44CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1233 18d8170-18d81ba 1235 18d81bc-18d81bf 1233->1235 1236 18d81c2-18d81ed DeleteFileW 1233->1236 1235->1236 1237 18d81ef-18d81f5 1236->1237 1238 18d81f6-18d821e 1236->1238 1237->1238
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 018D81E0
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2932435945.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_18d0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 682c118e18b21402b90026e689d68b8ba84fde0706915804b19e5d1ac392402d
                                          • Instruction ID: 349db09e5d568bf5488e907b94c3eff1b6350352ecf2093f31475383d46b59ed
                                          • Opcode Fuzzy Hash: 682c118e18b21402b90026e689d68b8ba84fde0706915804b19e5d1ac392402d
                                          • Instruction Fuzzy Hash: B11136B1C0065A9BCB14CFAAC544BDEFBB4BB48320F14816AD958A7250D738AA44CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1241 71c60da-71c60df 1242 71c60e0-71c6155 PeekMessageW 1241->1242 1243 71c615e-71c617f 1242->1243 1244 71c6157-71c615d 1242->1244 1244->1243
                                          APIs
                                          • PeekMessageW.USER32(?,?,?,?,?), ref: 071C6148
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MessagePeek
                                          • String ID:
                                          • API String ID: 2222842502-0
                                          • Opcode ID: 632cf5fb37c20e772d137eead4ccacf10d11f497c722c8e0268d3baf9f1646b4
                                          • Instruction ID: 4dffb39c0fe47356cd8f29328038e332da8da14eff42bbf845a389742d184ce3
                                          • Opcode Fuzzy Hash: 632cf5fb37c20e772d137eead4ccacf10d11f497c722c8e0268d3baf9f1646b4
                                          • Instruction Fuzzy Hash: 0A1137B6C00249DFCB10CF9AD944BDEFBF8EB48320F10842AE558A7651C378A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1246 71c0928-71c1af8 1248 71c1afa-71c1afd 1246->1248 1249 71c1b00-71c1b2f LoadLibraryExW 1246->1249 1248->1249 1250 71c1b38-71c1b55 1249->1250 1251 71c1b31-71c1b37 1249->1251 1251->1250
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,071C1A91,00000800), ref: 071C1B22
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 07369f90ab14ce32306852b9d8ae1e6cfc53e65963b41fdddff35be908cc80a3
                                          • Instruction ID: c9128a46762db1abd87447d7b15b61848de209a5d9c625d043cc4c0cdfd27c98
                                          • Opcode Fuzzy Hash: 07369f90ab14ce32306852b9d8ae1e6cfc53e65963b41fdddff35be908cc80a3
                                          • Instruction Fuzzy Hash: A81112B69002499FCB24CF9AC544BDEFBF4EB98310F10842EE919A7651C375A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1254 71c1ab2-71c1af8 1256 71c1afa-71c1afd 1254->1256 1257 71c1b00-71c1b2f LoadLibraryExW 1254->1257 1256->1257 1258 71c1b38-71c1b55 1257->1258 1259 71c1b31-71c1b37 1257->1259 1259->1258
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,071C1A91,00000800), ref: 071C1B22
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: d8be43198730b33841fb1cde4412fbfadc1c4e43fac1f8a6b8662943fdab16f9
                                          • Instruction ID: 813200c9141ada854d9d009795f5340e36fd50df580d32238f36cba6d805d4b8
                                          • Opcode Fuzzy Hash: d8be43198730b33841fb1cde4412fbfadc1c4e43fac1f8a6b8662943fdab16f9
                                          • Instruction Fuzzy Hash: E41123B6D002499FCB20CF9AD444BDEFBF4EB98320F10842ED919A7650C375A645CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1262 18df0f0-18df164 GlobalMemoryStatusEx 1264 18df16d-18df195 1262->1264 1265 18df166-18df16c 1262->1265 1265->1264
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 018DF157
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2932435945.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_18d0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 84b1597bc9390e07f8a9b5506ce476886f61508b3973bb79e9def2d97acd6b27
                                          • Instruction ID: b05a03b1138d1bcab0b9e0289378fd550d1a4d31174928e8d614667ce053f614
                                          • Opcode Fuzzy Hash: 84b1597bc9390e07f8a9b5506ce476886f61508b3973bb79e9def2d97acd6b27
                                          • Instruction Fuzzy Hash: 451123B1C006699BCB10CFAAC544BDEFBF4AF48324F10816AD918B7250D378A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1268 71c60e0-71c6155 PeekMessageW 1269 71c615e-71c617f 1268->1269 1270 71c6157-71c615d 1268->1270 1270->1269
                                          APIs
                                          • PeekMessageW.USER32(?,?,?,?,?), ref: 071C6148
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: MessagePeek
                                          • String ID:
                                          • API String ID: 2222842502-0
                                          • Opcode ID: 259f98bbcbe44d8f95b2c256300bd8ebeab42863b822589ba2097d1fb5bde444
                                          • Instruction ID: 99fe99a3852838bed95f9e02137a6bb57a442877a258d88ad65684558851908d
                                          • Opcode Fuzzy Hash: 259f98bbcbe44d8f95b2c256300bd8ebeab42863b822589ba2097d1fb5bde444
                                          • Instruction Fuzzy Hash: C21104B5C00249DFDB10CF9AD944BDEFBF8EB48324F10842AE958A7251C379A544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPpq
                                          • API String ID: 0-1266478781
                                          • Opcode ID: 284fd20bd958d2d67fe2b7c0cd0cf64b88445a6a2416fbf17f779eda0e83b2c8
                                          • Instruction ID: a82c5677dbf248ab2a8c93ff9f3d227343935a09bddecfab3412aaeb7960167a
                                          • Opcode Fuzzy Hash: 284fd20bd958d2d67fe2b7c0cd0cf64b88445a6a2416fbf17f779eda0e83b2c8
                                          • Instruction Fuzzy Hash: C5416D71F002099FEB54DFA5C814BAEBAF7FF88300F208529D106AB394DA758C41CB94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: 03173999dfc0148261781b28dcc992695e3688390b077894353f1ba56dfe9947
                                          • Instruction ID: aa7dee9a9b9d77b47c9cc22299f3183f4cf7f38719a4e72dcaea735e3a1021ef
                                          • Opcode Fuzzy Hash: 03173999dfc0148261781b28dcc992695e3688390b077894353f1ba56dfe9947
                                          • Instruction Fuzzy Hash: 87419F71E0020ADFDB65DF65C5546AEBBB6FF85390F208929E402EB344DB74E842CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: 6e72a60f8eb1679c45c38315a6a9058f20bea2011eb67998ce60bb8e11e9aafd
                                          • Instruction ID: a95a69abfe7406bee075ed996f6cffaa8d3899ec0f086a5953b796c2b389207e
                                          • Opcode Fuzzy Hash: 6e72a60f8eb1679c45c38315a6a9058f20bea2011eb67998ce60bb8e11e9aafd
                                          • Instruction Fuzzy Hash: 8831D030B002018FEB65ABB4C55466F7AE7AB89290F20842CD402DF398DF35DD82C795
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq
                                          • API String ID: 0-3037731980
                                          • Opcode ID: 9e5746769dab0f75849387e18dd38833b807a9ffaaf330e94e769749fcd5fd35
                                          • Instruction ID: c5a2e106e842cfb26fbbc1707c53f7dc5002e02437f7ff15dd3be1163e52893d
                                          • Opcode Fuzzy Hash: 9e5746769dab0f75849387e18dd38833b807a9ffaaf330e94e769749fcd5fd35
                                          • Instruction Fuzzy Hash: 2CF0A03AF00640CFEF659B81EB511A9B365E7402D0F180067DD208F140C339DD02CA94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \Opq
                                          • API String ID: 0-3546586535
                                          • Opcode ID: 3f25ac7bf83c4da1a2231f7855c5ff586d4ad2df294ca1ad99d1b715787622d3
                                          • Instruction ID: 54ae4a575ebac11a9e3e86564deb6609867d41247eb62a7d6689507ad65dc7f6
                                          • Opcode Fuzzy Hash: 3f25ac7bf83c4da1a2231f7855c5ff586d4ad2df294ca1ad99d1b715787622d3
                                          • Instruction Fuzzy Hash: C6F0FE30A10229DFDB14DF94E869BADBBF2FF84750F214129E402AB394CB745C05CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16e24d4fcca90b43c284cfa8be0ca97e2756cc95ebf7f175b9f1ce09a71a3df6
                                          • Instruction ID: 17cf255939c311e91790beee10882c27e07fa3624a260ab80807475fca7ce142
                                          • Opcode Fuzzy Hash: 16e24d4fcca90b43c284cfa8be0ca97e2756cc95ebf7f175b9f1ce09a71a3df6
                                          • Instruction Fuzzy Hash: 55418D30E00709DFDB04DFA9C8546AEBBB5EF88700F15C65DE509BB260EB70A981CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd143dd6ddb3fd874dc11e2d29c1d0e8009eebd0f75061279a9daf6f378ac5b3
                                          • Instruction ID: 428fc569aa06a20300c270e3b43501a9c16c3ec26deb2a6dbc727b2d5bab6f14
                                          • Opcode Fuzzy Hash: bd143dd6ddb3fd874dc11e2d29c1d0e8009eebd0f75061279a9daf6f378ac5b3
                                          • Instruction Fuzzy Hash: 21D19D34B012098FDF54DB69D980AADBBB6FF88350F108529D905DB395DB39EC42CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16c55ea4c6d5303712a53a7321ebd4f0cb7dd7b7d3a11ef7be8b878300778116
                                          • Instruction ID: 1651a70a214499e6d1781b2d6a5b08a33cd529d97c0458dc84fe195e16797351
                                          • Opcode Fuzzy Hash: 16c55ea4c6d5303712a53a7321ebd4f0cb7dd7b7d3a11ef7be8b878300778116
                                          • Instruction Fuzzy Hash: EAB15DB5F002159FDB14DFA5D994A6E77B6EFC4350F208429D902AF398DA78EC46CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 908cb1c2e790706e291fc4f2aabe4d9ec0d939c1db4cd3182c880419cad8af0b
                                          • Instruction ID: 6e32fcea8f7fd0739547e06fd97fcfc1e3d96d63daebb651b61d2a7c6e49340e
                                          • Opcode Fuzzy Hash: 908cb1c2e790706e291fc4f2aabe4d9ec0d939c1db4cd3182c880419cad8af0b
                                          • Instruction Fuzzy Hash: 33B18434E10209CFEF64DBACD5907AEB6B6FB89350F204929E405EB395CA35DC858B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 18ac7b9bff6af1a3b9215cfa5609569931d066d9191477bf3dc128e46c6d520e
                                          • Instruction ID: 9be8c1918ce5a866dbcb0b0e562c8673a0e1050113906b5ec392df38b4551274
                                          • Opcode Fuzzy Hash: 18ac7b9bff6af1a3b9215cfa5609569931d066d9191477bf3dc128e46c6d520e
                                          • Instruction Fuzzy Hash: 99A19334F00209CBEF64DBACD5907AEB6B6FB89350F208929E405EB395CA35DC858B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 450fd51e485047e1350aed066dd1d394d8b49c1b4c2300b436a3dfe8434ff6da
                                          • Instruction ID: 44e3d3c1ffc3af1e5016c4aace8b20b79b0b51d37156128a40f0be80834de8bd
                                          • Opcode Fuzzy Hash: 450fd51e485047e1350aed066dd1d394d8b49c1b4c2300b436a3dfe8434ff6da
                                          • Instruction Fuzzy Hash: 21A19B30E10209CFDBA0CB69D594BADB7B1EB45390F64856AE458DF3A5DB34DC82CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38e3013292c9be90dbb14107a1761e39ab1ba29c3eef4a82cd77d83194b172be
                                          • Instruction ID: f8911d00846d3f1c60555ea69ca822e4b92408eb2721ac9dbb7d90697617cf53
                                          • Opcode Fuzzy Hash: 38e3013292c9be90dbb14107a1761e39ab1ba29c3eef4a82cd77d83194b172be
                                          • Instruction Fuzzy Hash: 05A17A34E10209CFDBA0CB69D594BADB7B1EB45390F64856AE448DF3A5DB34DC82CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 62e901b5b8c89b5cbcd6f2d988ebf37db62f066ce4dbf5ddeec87533a2d0a830
                                          • Instruction ID: ea1abd9a2a886ba6c910b9e14b561a92260a32b39648a349e4b8de78c8ca64d7
                                          • Opcode Fuzzy Hash: 62e901b5b8c89b5cbcd6f2d988ebf37db62f066ce4dbf5ddeec87533a2d0a830
                                          • Instruction Fuzzy Hash: 3B91C0B5E142198FDF608B68C49076EFBA2EB863A0F14C967D469DF281C635DC81CBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5b2000ab3a79aa48a631a17f6fbed7bc40bccadce419a1feb3bcf10d43f8e77c
                                          • Instruction ID: 32fabd42cd21fa9e53c37a8188e7855e8a0761b5c003c37ee18845e4a97b8af2
                                          • Opcode Fuzzy Hash: 5b2000ab3a79aa48a631a17f6fbed7bc40bccadce419a1feb3bcf10d43f8e77c
                                          • Instruction Fuzzy Hash: D5A18830E00215CFCB64EB69D644A6DB7F2EF84394F158569E41AAF394EB76EC41CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d641aa8967a42e6f4df26130ca9d76badb2ce21cacb30b83c5d091b2c5227ed
                                          • Instruction ID: 68ba4a7be14ce6894263cf129b6aab5bd421bddf2612c98c63d01fcb8dd69e55
                                          • Opcode Fuzzy Hash: 1d641aa8967a42e6f4df26130ca9d76badb2ce21cacb30b83c5d091b2c5227ed
                                          • Instruction Fuzzy Hash: ED914DB4F002059BDB14DFB4D990A6E77B6EFC4350F648428D902AF398DA78ED46CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 063b2f834dbae7751d89b0fe3538d6c8fb5a4a63c29d41d24bf5ed281e4a3244
                                          • Instruction ID: a27342ee01f89b24477c29cf7bb406cba84eb16da529158c7b01c1816766d3ab
                                          • Opcode Fuzzy Hash: 063b2f834dbae7751d89b0fe3538d6c8fb5a4a63c29d41d24bf5ed281e4a3244
                                          • Instruction Fuzzy Hash: A9814AB4F002059BDB14DFA4D990A6E77B6EFC4360F648528D902AF398DB78ED46CB41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2225f139f3b687e5df69ddfd0f5daca1c7a9c9d5c7d5ddd8481a73850d0a25a9
                                          • Instruction ID: 24e41c6fa5415137ceadec3c53b4fee83b0d2099a8658ba1c1dd222db6e82c68
                                          • Opcode Fuzzy Hash: 2225f139f3b687e5df69ddfd0f5daca1c7a9c9d5c7d5ddd8481a73850d0a25a9
                                          • Instruction Fuzzy Hash: 6B61D4B2F001214FDF519B7DC89066FAAEBAFD4650B154039E80ADB379DE65DC0287D1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e7df47a6c2a966254c458837468168fb1e38660e3f57abcf87e995b45df297ed
                                          • Instruction ID: 42bb0883d4dff032804ec92e6103eed9e40e600e89f1b7cd81cfde8443447d96
                                          • Opcode Fuzzy Hash: e7df47a6c2a966254c458837468168fb1e38660e3f57abcf87e995b45df297ed
                                          • Instruction Fuzzy Hash: 39810934F0020A8BDF54DFA9D5546AEB7F6AFC9340F108529D50AEB398EA74DC428B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc20da85800ef7105af688439eeb0d04801cbcb401f3b534f4f40b3795f4ef4c
                                          • Instruction ID: 4612fbdac2ae532c428a504e08d472db031f6440489b7e8fb498dbde25986540
                                          • Opcode Fuzzy Hash: bc20da85800ef7105af688439eeb0d04801cbcb401f3b534f4f40b3795f4ef4c
                                          • Instruction Fuzzy Hash: 5B715C31E0031A8FDB65DFA9D9906AEB7B2FF85340F118629D409AF354DB74D886CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0d05ca658502d12796d7770dc4bed008f1fd4b732b7841570b625a7c90b64dc
                                          • Instruction ID: 700bbdfa18c5dd1798dbcc686fd9b35090f0838ddd12fefad661566941d46546
                                          • Opcode Fuzzy Hash: a0d05ca658502d12796d7770dc4bed008f1fd4b732b7841570b625a7c90b64dc
                                          • Instruction Fuzzy Hash: B9913F34E106198FDF60DF68C850B9DB7B1FF89310F208699D549AB355DB70AA85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8dd7011ccde2a6eb6c5e0dbe471008d5a6c230cb74ef4d7ef1feac2852d2ae2c
                                          • Instruction ID: b97b4421080968a00136d01de31d5a9c79b61396ac78f06d7bad841dfbf3b55b
                                          • Opcode Fuzzy Hash: 8dd7011ccde2a6eb6c5e0dbe471008d5a6c230cb74ef4d7ef1feac2852d2ae2c
                                          • Instruction Fuzzy Hash: F1913F34E106198FDF60DF68C850B9DB7B1FF89310F208699D549AB355DB70AA85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 305c002fc03f36fcc9b2a6905dd129abd2aec8c6aad9eca90a21831fe3b0379b
                                          • Instruction ID: 99ebb55c150371a00531efa9521a03e4e8deb615b42e890760e8b5478c4d22d2
                                          • Opcode Fuzzy Hash: 305c002fc03f36fcc9b2a6905dd129abd2aec8c6aad9eca90a21831fe3b0379b
                                          • Instruction Fuzzy Hash: 31713870E012098FDB54DBA9D980AAEBBF6FF88340F148529E415EB365DB30EC46CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a064cfd9346cd152a515525d55f4cdfaf50dfecbfaa88833842e225165355bd9
                                          • Instruction ID: 962dd568ac4ca71984a48c95bda95fabe116ad5a106ca129c800ed9f46391b96
                                          • Opcode Fuzzy Hash: a064cfd9346cd152a515525d55f4cdfaf50dfecbfaa88833842e225165355bd9
                                          • Instruction Fuzzy Hash: DA713970E012098FCB54DBA9D980AAEBBF6FF88340F148529E415EB364DB30ED46CB40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 43a94cb1a9e0ba9c58fcf7bf2db628fdc6669d91fdb5fac2243f434fdb2f8c7b
                                          • Instruction ID: 039a1e4b218ab27e004a714df33932aadb9487f8b1d6154b78c6c9e2667f32b8
                                          • Opcode Fuzzy Hash: 43a94cb1a9e0ba9c58fcf7bf2db628fdc6669d91fdb5fac2243f434fdb2f8c7b
                                          • Instruction Fuzzy Hash: 8951D570F11215CFEF609668DD64B7F269EEB89390F20482AE40ADB3E5C92DCC4583A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 59ab24ef27d874410a6ca71cfbfed005e0853acb225fe925834af3097269b15e
                                          • Instruction ID: 353712438d98eda8971f9dd4efc64701581a5148603ea32ecd90d8b579f2f0cb
                                          • Opcode Fuzzy Hash: 59ab24ef27d874410a6ca71cfbfed005e0853acb225fe925834af3097269b15e
                                          • Instruction Fuzzy Hash: 3B51D331E02109CFDB64EB78E4546ADBBF6EF883A5F108869D506DB250DB358955CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5345c457f5bab20b675f7d791db0f2aa28e11a22caf446a4734f2343bb829d7e
                                          • Instruction ID: 50f0e6b58281a2a4cf9a7f29c8779cb2930fdb2bd8bbcb7d7b68c7f0ddaca78b
                                          • Opcode Fuzzy Hash: 5345c457f5bab20b675f7d791db0f2aa28e11a22caf446a4734f2343bb829d7e
                                          • Instruction Fuzzy Hash: BF51C370F11215CFEF64966CD95477F269EE789390F20482AE50ADB3E4C92DCC8143A2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eb426d2081fbd90cc249bf221937ba4599754d08cb3fa4815813f37bfffddd5f
                                          • Instruction ID: 8aa9e7e13642007fb2464db796e39c6cab972f52ee8de4a5da37bc5bbe0cad66
                                          • Opcode Fuzzy Hash: eb426d2081fbd90cc249bf221937ba4599754d08cb3fa4815813f37bfffddd5f
                                          • Instruction Fuzzy Hash: 275191B4E1021A8FDF648B68C484A7EFBB2FB85350F248A26E456DF241C634EC51CBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6c7d80b6dcba8f39d7a621ac1608b2b01606e5e59f2c777b17e4adbf5de89d6
                                          • Instruction ID: 0acab05529c2cfd49363c4fb9438d18960bae076aee66bda6528629db7f87cae
                                          • Opcode Fuzzy Hash: c6c7d80b6dcba8f39d7a621ac1608b2b01606e5e59f2c777b17e4adbf5de89d6
                                          • Instruction Fuzzy Hash: F94160B1E002099FDF70CEA9D880AAFFBF2FB85354F10492AD156DB654D330E9598B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6d7d7282b31a22146ce471594507dd85e920322559292fd5709f7761d07a981a
                                          • Instruction ID: d98206e88081b0e0a54198d15dd28287c71eb9af66c923d9fb3bc82d072d1750
                                          • Opcode Fuzzy Hash: 6d7d7282b31a22146ce471594507dd85e920322559292fd5709f7761d07a981a
                                          • Instruction Fuzzy Hash: 63317E30E1021A9FCB24DF65D9A069EBBB6FF85344F104929E405AB358EB70E946CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 34e9896fe67cfa31d60614ef8ca296224fbec03d1d66288d36775187f529c725
                                          • Instruction ID: 539682aedfb457cd1f114ea9962689586789c1e9b4fbbd3162635ff71726b207
                                          • Opcode Fuzzy Hash: 34e9896fe67cfa31d60614ef8ca296224fbec03d1d66288d36775187f529c725
                                          • Instruction Fuzzy Hash: C131A134E0025A9FCB15CFA5D9546AEBBB2FF89340F108929E906EB354DB71ED81CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b0e2d67123c346af2a232bd02e3e5859fa44bcf46681f4f09fb0b43c08f25f61
                                          • Instruction ID: 518e5e186067a5815a7d47fb2c86129fd0d44d5db0deca0528aeb524be873202
                                          • Opcode Fuzzy Hash: b0e2d67123c346af2a232bd02e3e5859fa44bcf46681f4f09fb0b43c08f25f61
                                          • Instruction Fuzzy Hash: AF319070A002068FDB11EB79DD40AAEB7F5EF8A710F104529D005EB7A5DB39AD42CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 913980a2410901b9b1c7b854194ea35ecb84d39f7821ef9bc7e1cc50226e0c8e
                                          • Instruction ID: 9d81d0dbd41f290303cbd8b8780601823ecce26381601be3090a0e698e2daae6
                                          • Opcode Fuzzy Hash: 913980a2410901b9b1c7b854194ea35ecb84d39f7821ef9bc7e1cc50226e0c8e
                                          • Instruction Fuzzy Hash: 623180B1D01219AFDB10CFA9D885BDEFBB8FB49310F10816AE408E7241E3759A44CBE0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cb726627a661f4cb713ac56080895ff04ba56f2ce98a7d78d4c06f3ce56d4dfd
                                          • Instruction ID: 6ba286e745b00d9e1b2fb47d02ad015e0f4a23f0e3218e81aa477a79fb7b729d
                                          • Opcode Fuzzy Hash: cb726627a661f4cb713ac56080895ff04ba56f2ce98a7d78d4c06f3ce56d4dfd
                                          • Instruction Fuzzy Hash: BB317E70A0021A8FDF51EB69DD40ABEB7F5EF89710F104529D006EB765DB39AD42CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ff30f20695c1d602d3f796972dd43bbb2a7712eb3fc593245c6a8644d9824f4
                                          • Instruction ID: e184ff62d39f589c51ca76ce297bc3816b92ae62214a9789ade0805b2844b3c4
                                          • Opcode Fuzzy Hash: 1ff30f20695c1d602d3f796972dd43bbb2a7712eb3fc593245c6a8644d9824f4
                                          • Instruction Fuzzy Hash: D3316130E1061A8FCB24DF69C9A069EBBB6FF85340F104929E405EB354EB71E946CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a33cc25361d909eca63332b08eb5d18bfc1d2b77e609a70e0539b2ad2f992380
                                          • Instruction ID: ab8e519508796e104e92d2491af34ba6e2a273b0d874bd938c7398750c858a5a
                                          • Opcode Fuzzy Hash: a33cc25361d909eca63332b08eb5d18bfc1d2b77e609a70e0539b2ad2f992380
                                          • Instruction Fuzzy Hash: F9319034E1021A9BCB14CFA5D954AAEB7F2FF89340F108529E906EB350DB71ED81CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9034bd71c267de8e9c1eefa848d0eed83540961e46cc53730511e36941d09417
                                          • Instruction ID: 187c5f0ae2323b592ea957acbcac5559be62d0e283fa54650d18109a9e500358
                                          • Opcode Fuzzy Hash: 9034bd71c267de8e9c1eefa848d0eed83540961e46cc53730511e36941d09417
                                          • Instruction Fuzzy Hash: 2121AE7AF002158FEB50DF79D980AAEB7F5EB88750F108029E905EB394E774DD418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05a9627426d5fde7c99f9369967ec3c191edeee4b089b40c772f0b164168ca73
                                          • Instruction ID: 702b8de9c84168edbf7c94901c85b1528a87039b640334b7d9f19ffc6a520378
                                          • Opcode Fuzzy Hash: 05a9627426d5fde7c99f9369967ec3c191edeee4b089b40c772f0b164168ca73
                                          • Instruction Fuzzy Hash: F821AC7AF012159FEB50DF79D880AAEBBF5EB88750F108029E905EB390E774DD418B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2dbd65259cf8fb7b1e2a2db9faf7c10e365d57dcae21a77d57b9ca40bcd16468
                                          • Instruction ID: 299ab91c30abc984b29c1f31b9aeddc085894bf0902bc44b8988092498f5c47a
                                          • Opcode Fuzzy Hash: 2dbd65259cf8fb7b1e2a2db9faf7c10e365d57dcae21a77d57b9ca40bcd16468
                                          • Instruction Fuzzy Hash: 7731E0B4D01318EFDB24CF99C988BDEBFF9EB48714F20805AE404AB250C3B59845CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b65062e6de3ac893a2b2048d61cbfddd00180f6f4fc93ac67e504f93df3ceda
                                          • Instruction ID: 71867b837d11f5fecc6d3d121665d5ad7770507e3d979b97317595483647e12a
                                          • Opcode Fuzzy Hash: 9b65062e6de3ac893a2b2048d61cbfddd00180f6f4fc93ac67e504f93df3ceda
                                          • Instruction Fuzzy Hash: 45212679504244DFDB01DF58D9C4B2ABB65FB84334F20C66DDB494B346C376E446CAA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0475be3f0e12d839a2919a3939acec2539fcc34083f8ffd43566044be136bda0
                                          • Instruction ID: 819543263ed2c01abc5cd5d474c68cc3fdf468646291cb7979a76e1cc9eba04c
                                          • Opcode Fuzzy Hash: 0475be3f0e12d839a2919a3939acec2539fcc34083f8ffd43566044be136bda0
                                          • Instruction Fuzzy Hash: 9A212671504204DFDB05DF58D9C4B26BFA5FB84314F20C56DDA0A4B396C376F846CA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 25f45b6119227d665c6fc3a31f82c0c910166da0c0fa998688aa016564b31f8d
                                          • Instruction ID: d052867b699eb7cbfed8570ea9541d7480a51cb783cdc0e25fd2032e916befea
                                          • Opcode Fuzzy Hash: 25f45b6119227d665c6fc3a31f82c0c910166da0c0fa998688aa016564b31f8d
                                          • Instruction Fuzzy Hash: 27210471504204EFDB15DF68CDC4B26BBA5FB84314F20C56DEA494B356C73AE447CA62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c828ccc6a0d5409e6a45a00a5d17b4689548edbf3a6a9f23f69b74692c7fa6b
                                          • Instruction ID: e79a8ed60aa2415fe24ec3b106db3bfcdfe5362ad6a8f816e2204bef95bf0ff1
                                          • Opcode Fuzzy Hash: 8c828ccc6a0d5409e6a45a00a5d17b4689548edbf3a6a9f23f69b74692c7fa6b
                                          • Instruction Fuzzy Hash: 8C2105B1644240DFDB05DF58DDC4B26BFA6FB84319F20C66DDA0A4B366C33AE846C661
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8dd8599a872bc5d9b5d45853de10a7f821e849e8163d2b60d4324244a24734be
                                          • Instruction ID: e1cc170598bbc56a9ed551f93d58c0494422d23a76cda16ce03cc5bf9c5689fc
                                          • Opcode Fuzzy Hash: 8dd8599a872bc5d9b5d45853de10a7f821e849e8163d2b60d4324244a24734be
                                          • Instruction Fuzzy Hash: BD31D1B4D00318DFDB24CF99C988BAEBBF4EB48714F24845AE404AB350C7B59845CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 389f11226130d4b1cf90d86e53f788a80a6342f71c9993f21d59799fbf44e4cd
                                          • Instruction ID: 8b4145328eb6b51bfce9020ad6e489d6c1b508b2c0d873ffc6ee2a77f5d5c203
                                          • Opcode Fuzzy Hash: 389f11226130d4b1cf90d86e53f788a80a6342f71c9993f21d59799fbf44e4cd
                                          • Instruction Fuzzy Hash: 02110830F122196BEF64297D8D6077F159EC7C5790F64082AE00ADB3A9C819CC4103E2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05a0362d66f80a9c818ecdf7986d7ca8f87d5b0621d093a959fac93d0574c9ee
                                          • Instruction ID: 0dedee0a20fe9386b4a331bbd07734d292db857b83a5a7b1ffa7776f77304515
                                          • Opcode Fuzzy Hash: 05a0362d66f80a9c818ecdf7986d7ca8f87d5b0621d093a959fac93d0574c9ee
                                          • Instruction Fuzzy Hash: 3D21B430F101199FDF64DB69E9506AEB7BBEB84390F248425E805EF394DB75DC418B80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f59ccb44a86983f20fcecb53389d5063d68621d87a3af264f2179b1f1f3d3508
                                          • Instruction ID: 53e20fd5ef399605490a7cb39dbd239e2e1dc027634122f5bb00ff375c35e7b6
                                          • Opcode Fuzzy Hash: f59ccb44a86983f20fcecb53389d5063d68621d87a3af264f2179b1f1f3d3508
                                          • Instruction Fuzzy Hash: E111AF32E002299FCB649B69D8405DEF7F6FB89350F108569D006EB344DA32D940CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 11d74c7900efead62d7e14000aeb488b8d1221d7bc05ca93c0e80a1ba50e91a3
                                          • Instruction ID: 9f0e1ecd71f4334b150c732ab4563e5227bce3ed4212833982b12d0293dd2821
                                          • Opcode Fuzzy Hash: 11d74c7900efead62d7e14000aeb488b8d1221d7bc05ca93c0e80a1ba50e91a3
                                          • Instruction Fuzzy Hash: 3B112635F022241FCB619B7DE85177BB7D6E789790F108429E10ACB340EA27DC028790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b9b5bc10e938872e2c2136f79b379fadc491c3fe68ea21cf871f078305385be
                                          • Instruction ID: 517b14682a866524e719b73ae82dccae3f9c96ce3c421e9898101aaff05df194
                                          • Opcode Fuzzy Hash: 9b9b5bc10e938872e2c2136f79b379fadc491c3fe68ea21cf871f078305385be
                                          • Instruction Fuzzy Hash: BE018430F21229A7EF64396E8D6472F51CED7C97A0F60482AD40ADB3D8D859CC8103E6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6986315a8b67e954a0bcb2312043f6f503b7a49ac0e523a50a3a38bf2793f5c2
                                          • Instruction ID: 618a756130922101861794737391a1d3b0ed4edaeda749ad7d69e44374283c4e
                                          • Opcode Fuzzy Hash: 6986315a8b67e954a0bcb2312043f6f503b7a49ac0e523a50a3a38bf2793f5c2
                                          • Instruction Fuzzy Hash: D4118E36F001298FDF549A69DD146AE73EAEBC8790B008439D40AEB354EE65DC028B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe5c4cd7754d101e8cd5d0e3cd266b29853a3f89b67010fbc1bd3d0176c8968c
                                          • Instruction ID: 81c7f9db7951ee0af8e8475f6df347d565f25c26e0987540f210c1dadff287a0
                                          • Opcode Fuzzy Hash: fe5c4cd7754d101e8cd5d0e3cd266b29853a3f89b67010fbc1bd3d0176c8968c
                                          • Instruction Fuzzy Hash: 44019E36B102195BDF58AA69DC186EB72FAEBC8691F044439D40AD7344FEA49C0247E1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d61ee26a3d8a154eda41c68f8b3b5512f1271c6ae371f6dc9702f1c8d783f7dc
                                          • Instruction ID: 7e0b870f5634cd1720c08184ef3ae4d96054d2950302b2cb169e1fd406018a7a
                                          • Opcode Fuzzy Hash: d61ee26a3d8a154eda41c68f8b3b5512f1271c6ae371f6dc9702f1c8d783f7dc
                                          • Instruction Fuzzy Hash: 4D01A231F000210BDB649ABE9814B7BB6DBDBC9790F108439E10ACB744E961DC8247D5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: af563f16462d5b5ed9a0da3b285e052f3722d148d64d0a3f21acf5c06f8f65e1
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: B711BB75504284CFDB12CF54C9C4B16BFA2FB84314F24C6AED9494B352C33AE44ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                          • Instruction ID: 4484f8258e615d40c76b3c53821242fe131be6a4d9e57619c6b7088950880b3f
                                          • Opcode Fuzzy Hash: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                          • Instruction Fuzzy Hash: E111907A504284CFDB12CF54D9C4B56BF61FB84224F24C6AEDA494B756C33AE40ACB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: bb25b94216037e551cd497dc713013b49f10b8c9100af27416465aa293680844
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: 9C11BB75504280DFDB02CF58D9C4B55BFA2FB84214F24C6AED9494B356C33AE40ACBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fbaf69fa020a81a8ed60af58d04d051393856de18240d0def33f8d72dc2f04cb
                                          • Instruction ID: 13ac7feb2f615899162aab6790ee36fbc74ad3e86f765201d7b4ea0572943d40
                                          • Opcode Fuzzy Hash: fbaf69fa020a81a8ed60af58d04d051393856de18240d0def33f8d72dc2f04cb
                                          • Instruction Fuzzy Hash: 0B11D3B5D01259AFCB00DF9AD884ACEFFB8FB49310F10812AE918A7240C375A544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931574454.00000000016FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16fd000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                          • Instruction ID: 44d275868c7d312c1868c243e5cddae5400da9c831896ce5ce89ddcfb064bb98
                                          • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                          • Instruction Fuzzy Hash: 87119D75504280CFDB16CF58D9C4B16BFA2FB84318F24C6ADD9494B766C33AE44ACB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2ce9263b1ea5d78f0443ac355992167a5cb2b33ee1296a79a2d6a67bb5e649cf
                                          • Instruction ID: d4b1327b58e92f6c2dde658ca0928804438fbea3cbc9276028131f0581e4d6ea
                                          • Opcode Fuzzy Hash: 2ce9263b1ea5d78f0443ac355992167a5cb2b33ee1296a79a2d6a67bb5e649cf
                                          • Instruction Fuzzy Hash: D911D3B5D01259AFCB00DF9AD884ACEFFB8FB49310F10812AE918A7240C375A544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a90d980ae1529ce3c060d521b5c570efbc2b5ed224705d113d1989b7f09cc3e
                                          • Instruction ID: 139afb97dbe1afc8bab1751051a39fdb118a7c392f7d9b0d9bdf78d0123c581b
                                          • Opcode Fuzzy Hash: 6a90d980ae1529ce3c060d521b5c570efbc2b5ed224705d113d1989b7f09cc3e
                                          • Instruction Fuzzy Hash: D5018131F000220BDB649ABE9814B6FB2DBDBC9B60F108839E50ACB744EA65DC424795
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2c6f8838c67b3c5232bbdb4f31fb83dab8eab2a85284b6f6f4ff37f32adf1ad9
                                          • Instruction ID: 486f13566fceb8602007a05316f5781684a6eb413dda4adcfe93ebb79ae5680d
                                          • Opcode Fuzzy Hash: 2c6f8838c67b3c5232bbdb4f31fb83dab8eab2a85284b6f6f4ff37f32adf1ad9
                                          • Instruction Fuzzy Hash: 3C018175F005220BCB65957DDC6073E72D7E7C9BA0F108839E10BDB344EA66DC024395
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 896814e11b2006b2a5a89a564dda3eacc6654c2764e2c6ec0fd37ae5eb19b86a
                                          • Instruction ID: 2c522efe24915ae47d8d7dbd8d84aa93183cd8c368d5cc7c13d536aabfeafc80
                                          • Opcode Fuzzy Hash: 896814e11b2006b2a5a89a564dda3eacc6654c2764e2c6ec0fd37ae5eb19b86a
                                          • Instruction Fuzzy Hash: E2013134F012294FDB64DA7DE55572EB3D6E789B90F108828E10ACB354EE26DC428784
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931389769.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16ed000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 98c24a9b59a3847f761c6c2a97f3e53689a2270b87e882d50d8714676f361e85
                                          • Instruction ID: a823ac456bf1e1fa32b2a4ba6ea9daa7b36526b2edc0ea0061c4b203d9764962
                                          • Opcode Fuzzy Hash: 98c24a9b59a3847f761c6c2a97f3e53689a2270b87e882d50d8714676f361e85
                                          • Instruction Fuzzy Hash: 9B01DB3100A3449AE7114A5ADD88767BFECEF45324F18C62AED4D4B286C779D841C671
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 70bb13592626ae47639ffefeeb5c382de008a384d3fcc97102786af1c37e30ab
                                          • Instruction ID: 2ca10493030f6f274d1e705cd4cf998736486736b39b5b3513ec04f86ff9deb8
                                          • Opcode Fuzzy Hash: 70bb13592626ae47639ffefeeb5c382de008a384d3fcc97102786af1c37e30ab
                                          • Instruction Fuzzy Hash: 6B010C74844219DBEB10CF6AC8043AABEB5EB48754F148569F824AA290D7754A85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8b761adf48cf8f169337058c60b263482dd7e1f0b8fe130b21fcfea143128637
                                          • Instruction ID: cebc9d3a7023117000aca9f0674062209a4646cb4a80520b140d7a5860822daa
                                          • Opcode Fuzzy Hash: 8b761adf48cf8f169337058c60b263482dd7e1f0b8fe130b21fcfea143128637
                                          • Instruction Fuzzy Hash: C6F054717042046FD3049A6A9C84F57FBEEEFD5720F2581AEF144D7351DAB1AC018664
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e6fc4ec8cb91ac277b41f5d8317b1617b84cf7a3a34a78f925306ebfe21f4fcd
                                          • Instruction ID: a9e3691ef5cdb49fc4ff9802ae604032f421a185cc3212a0d5e92b3056c1c5e6
                                          • Opcode Fuzzy Hash: e6fc4ec8cb91ac277b41f5d8317b1617b84cf7a3a34a78f925306ebfe21f4fcd
                                          • Instruction Fuzzy Hash: 99F0F635E113649BCF645A6AD80099EBB39EB85394F104429E911EB284D7355D04CBD0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931389769.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16ed000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 550cb4623a73f55d3c8d846a653a699e44cd69f31c52f8354a1997cf422b378b
                                          • Instruction ID: 80bcc99de0ebb1b21b2efa2627f7652e383fbc9d728359ddcb018fe575fd82e9
                                          • Opcode Fuzzy Hash: 550cb4623a73f55d3c8d846a653a699e44cd69f31c52f8354a1997cf422b378b
                                          • Instruction Fuzzy Hash: BDF06272405344AAE7118E1ADD88B66FFE8EB45624F18C55AED484F286C3799844CA71
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fecbf80e874afda2017aeebcd68567134ddd4fe4ecf2adb9062ca7c49b99f0dc
                                          • Instruction ID: c089f62c2b42ac071eba8f3753df90c62f0c184f088ab3b6ff3023a6ffa4b338
                                          • Opcode Fuzzy Hash: fecbf80e874afda2017aeebcd68567134ddd4fe4ecf2adb9062ca7c49b99f0dc
                                          • Instruction Fuzzy Hash: C301FB74804219DFEB14DF6AC8043AEBFF5FF48764F148629E824AA290D7744A84CFD0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 54bea4512af6c7cdc0c13af6666a921265204cda95de085fc2a1b3aab4a2bfd7
                                          • Instruction ID: fbdda26afdeb0ad12b5f6d6cbcd4fa025545c26ef804fe1406bfe4b7bf97765d
                                          • Opcode Fuzzy Hash: 54bea4512af6c7cdc0c13af6666a921265204cda95de085fc2a1b3aab4a2bfd7
                                          • Instruction Fuzzy Hash: 29F06D71E00304ABCB34CFA9D84059ABBF8EF49300B50465AE4559B250CB71EA14CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a88a580cc8cfb58c3107a7768c7392376fa1c33cf94af20e2e8c5e2dabbaf84e
                                          • Instruction ID: 4ff23ff09d464ebab7d061cfae557e4e00c133f0cf08292dd64edece5165beab
                                          • Opcode Fuzzy Hash: a88a580cc8cfb58c3107a7768c7392376fa1c33cf94af20e2e8c5e2dabbaf84e
                                          • Instruction Fuzzy Hash: 67E06D717002186FD3049A5E9C44E6BFBEEFFD9620B21807AE544D7360CAB0AC0086A8
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06bdb387a06815e495a2aa9c77886510364533f5f38e54df5105d486d911e069
                                          • Instruction ID: 00911364a6e46cafb141145366436779f37024fb9760827a064682781c945c5a
                                          • Opcode Fuzzy Hash: 06bdb387a06815e495a2aa9c77886510364533f5f38e54df5105d486d911e069
                                          • Instruction Fuzzy Hash: CDE065353001005FD314CA1EDC84E46FBD9EB99324F60506AF509CB360CA31AC028A54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a761804e5aca482e04b9022504f099600293514f5eeb7a53952b851286015e30
                                          • Instruction ID: 5b346622f58318994d7d39b9a2c5e8cda475945123b3cf16fbd53048320b49cb
                                          • Opcode Fuzzy Hash: a761804e5aca482e04b9022504f099600293514f5eeb7a53952b851286015e30
                                          • Instruction Fuzzy Hash: 90F03075E00714EF8B34CFA9D84049AFBF9EF49610B408A6EE45697600D771EA14CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2931172192.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_16c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2dc02f45c2fe130b520a69752fa2506276bd3d0f9c25e0d02b8dc5aba074d8e5
                                          • Instruction ID: 2184a8146a936b16163e577e17b118fd891a4fee55e0feb71df48c2793c5ab72
                                          • Opcode Fuzzy Hash: 2dc02f45c2fe130b520a69752fa2506276bd3d0f9c25e0d02b8dc5aba074d8e5
                                          • Instruction Fuzzy Hash: 37E046363001106FC3108A0EEC88D06FBE9EB88630B50802AFA09C7360CA30AC018AA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1324371161
                                          • Opcode ID: 9852478f34c58964c48f9576c1a9786c50e3fb97ce9340fcc6c3b948ae0a7544
                                          • Instruction ID: 0614a4c67adeb8ccc3bae91906de56c0b5c527c4bb16bd38419af575f14a0100
                                          • Opcode Fuzzy Hash: 9852478f34c58964c48f9576c1a9786c50e3fb97ce9340fcc6c3b948ae0a7544
                                          • Instruction Fuzzy Hash: E0121C34E012198FDB64EF69C954A9EB7F2FF88340F208569D409AB364DB359D85CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetKeyState.USER32(00000010), ref: 071C8125
                                          • GetKeyState.USER32(00000011), ref: 071C816A
                                          • GetKeyState.USER32(00000012), ref: 071C81AF
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: State
                                          • String ID:
                                          • API String ID: 1649606143-0
                                          • Opcode ID: 82ea4368c1f2c345e64f47fd06e2c299601de127331038ca4a5695c93c4af046
                                          • Instruction ID: 97798d9ca166e5c74356d558063ee320012352d2808a944c83da43922d6ea677
                                          • Opcode Fuzzy Hash: 82ea4368c1f2c345e64f47fd06e2c299601de127331038ca4a5695c93c4af046
                                          • Instruction Fuzzy Hash: 9731AEB08007998FDB11DF99D9487EFBFF4AB19308F14845ED489BB290C3799585CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetKeyState.USER32(00000010), ref: 071C8125
                                          • GetKeyState.USER32(00000011), ref: 071C816A
                                          • GetKeyState.USER32(00000012), ref: 071C81AF
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2974155040.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_71c0000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID: State
                                          • String ID:
                                          • API String ID: 1649606143-0
                                          • Opcode ID: 88aac0b2531c5402391d7e0a32c841eaa42c988549d34574c1b6fa51f7cbbd57
                                          • Instruction ID: 72acd85c3338800653ae3fe5088b4db0c78c7da56fb80fcaba96203b8cadb0be
                                          • Opcode Fuzzy Hash: 88aac0b2531c5402391d7e0a32c841eaa42c988549d34574c1b6fa51f7cbbd57
                                          • Instruction Fuzzy Hash: 08318DB080075A8EDB11DF9AD9487EFBFF4AB58308F20841DD448BB280C3B99585CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1078448309
                                          • Opcode ID: 8d12ca3d14ae88e8150ab4022cb3da76f84fa062e958c4b0791a0f562dd7611c
                                          • Instruction ID: 9cd72a9597e9cadb83c3d0aabaa80c9dabf0364feec42bd7a516c1d55026661e
                                          • Opcode Fuzzy Hash: 8d12ca3d14ae88e8150ab4022cb3da76f84fa062e958c4b0791a0f562dd7611c
                                          • Instruction Fuzzy Hash: 29918F30E02209DFEB64DF69DA54B6EBBB2EF84340F208529E4019B394DB79DD45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1078448309
                                          • Opcode ID: c7196dcad5a957f9a3e24fe060538c311c2115c6728c8fde03cf9e191d79c3bd
                                          • Instruction ID: 90211d0952fbe89cf3169f27e1cf9d7549e10ef372e71f22485021e8189f549a
                                          • Opcode Fuzzy Hash: c7196dcad5a957f9a3e24fe060538c311c2115c6728c8fde03cf9e191d79c3bd
                                          • Instruction Fuzzy Hash: 5E51A034E122098FDF69EB69D98066EB7B3EF88340F208529D405DB395DB38ED41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: c95c08af3a786f10a3998c5d1119b708b44591a8dbccc48d745a353f0bea41d0
                                          • Instruction ID: 95e6b81881000d61404e949e5b034d5a8c8a5c0433503602be0dc50e14fe2d08
                                          • Opcode Fuzzy Hash: c95c08af3a786f10a3998c5d1119b708b44591a8dbccc48d745a353f0bea41d0
                                          • Instruction Fuzzy Hash: CBF14C34B01209CFDB59EB69C554A6EB7B6FF88340F208568D4059F3A8DB35EC82CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: a63bd76b498d58bae4586ea7af80d82a4b9b9f6679b7aa2c65b5526870189c29
                                          • Instruction ID: 387ad87360f0f2493093083fa02ab3905c8288f9474dfe98055067e69710a40a
                                          • Opcode Fuzzy Hash: a63bd76b498d58bae4586ea7af80d82a4b9b9f6679b7aa2c65b5526870189c29
                                          • Instruction Fuzzy Hash: 9C71AB30E00219CFDB68DF69D99066EB7A2FF84380F20856AD406EF758DB75E845CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: b3236cc3b3470567fab4217724f1db9abe9b05924e0379734c3e21ff4202f3aa
                                          • Instruction ID: d5e7dd9c919eccd150aac2cfac221074531ab51bae5bbc36a70d1c28832e5f1d
                                          • Opcode Fuzzy Hash: b3236cc3b3470567fab4217724f1db9abe9b05924e0379734c3e21ff4202f3aa
                                          • Instruction Fuzzy Hash: D1B13A34E112098FDB64EF69C69466EB7B2FF84390F248529D416DB394DB75DC82CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: 026a978b5503ca8bdaebb6708b1adc0139525ce64c735148faf401d7e87f9de9
                                          • Instruction ID: 2f13d5ee6ab35b135a5088f86d5eae6cdee73fad798e0f8991f6fed4341340a8
                                          • Opcode Fuzzy Hash: 026a978b5503ca8bdaebb6708b1adc0139525ce64c735148faf401d7e87f9de9
                                          • Instruction Fuzzy Hash: 6851D034E122058FDF65DB69D9806AEB7B2EF89380F20456AD805DF395CB34DD42CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000F.00000002.2971682482.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_15_2_6f10000_eDnxmGWzJ.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRkq$LRkq$$kq$$kq
                                          • API String ID: 0-2392252538
                                          • Opcode ID: 4b7129a1dc25c0e8a2279dbccd2863981c8e9016a03282254024470b6f350c33
                                          • Instruction ID: a1198b2aebfcec8eb4f92e7b746a1c979d60dc91bdc902f48a3270797e08e24e
                                          • Opcode Fuzzy Hash: 4b7129a1dc25c0e8a2279dbccd2863981c8e9016a03282254024470b6f350c33
                                          • Instruction Fuzzy Hash: 9151D434B002058FDB64DB28CA90A6EB7E6FF88380F14856DE4159F3A9DB34EC41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:10.6%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:228
                                          Total number of Limit Nodes:10
                                          execution_graph 29944 d9fa38 29945 d9fa7e 29944->29945 29948 d9fc18 29945->29948 29951 d9dd90 29948->29951 29952 d9fc80 DuplicateHandle 29951->29952 29953 d9fb6b 29952->29953 30137 d94668 30138 d94672 30137->30138 30142 d94758 30137->30142 30147 d93e28 30138->30147 30140 d9468d 30143 d9475c 30142->30143 30154 d94858 30143->30154 30158 d94868 30143->30158 30148 d93e33 30147->30148 30166 d97288 30148->30166 30173 d97278 30148->30173 30149 d96fb2 30150 d95c54 LoadLibraryExW GetModuleHandleW 30149->30150 30151 d96fe2 30150->30151 30151->30140 30156 d9485c 30154->30156 30155 d9496c 30155->30155 30156->30155 30162 d944b0 30156->30162 30160 d9488f 30158->30160 30159 d9496c 30159->30159 30160->30159 30161 d944b0 CreateActCtxA 30160->30161 30161->30159 30163 d958f8 CreateActCtxA 30162->30163 30165 d959bb 30163->30165 30165->30165 30167 d972b1 30166->30167 30168 d972c8 30167->30168 30180 d97878 30167->30180 30185 d97340 30167->30185 30190 d9732e 30167->30190 30195 d9737a 30167->30195 30168->30168 30174 d9727c 30173->30174 30175 d972c8 30174->30175 30176 d97878 2 API calls 30174->30176 30177 d9737a 2 API calls 30174->30177 30178 d9732e 2 API calls 30174->30178 30179 d97340 2 API calls 30174->30179 30175->30175 30176->30175 30177->30175 30178->30175 30179->30175 30181 d9795a 30180->30181 30182 d97994 30181->30182 30200 d996e0 30181->30200 30206 d996b0 30181->30206 30182->30168 30186 d9739d 30185->30186 30187 d97994 30186->30187 30188 d996e0 2 API calls 30186->30188 30189 d996b0 2 API calls 30186->30189 30187->30168 30188->30187 30189->30187 30191 d97334 30190->30191 30192 d97994 30191->30192 30193 d996e0 2 API calls 30191->30193 30194 d996b0 2 API calls 30191->30194 30192->30168 30193->30192 30194->30192 30197 d9738e 30195->30197 30196 d97994 30196->30168 30197->30168 30197->30196 30198 d996e0 2 API calls 30197->30198 30199 d996b0 2 API calls 30197->30199 30198->30196 30199->30196 30201 d996f0 30200->30201 30202 d9974e 30200->30202 30201->30182 30203 d997c0 30202->30203 30211 d98a20 30202->30211 30203->30182 30205 d9986d 30205->30182 30208 d996bc 30206->30208 30207 d996f0 30207->30182 30208->30207 30209 d98a20 2 API calls 30208->30209 30210 d9986d 30209->30210 30210->30182 30212 d98a2b 30211->30212 30215 d98a50 30212->30215 30214 d99942 30214->30205 30216 d98a5b 30215->30216 30219 d98a80 30216->30219 30218 d99a45 30218->30214 30220 d98a8b 30219->30220 30221 d9abcb 30220->30221 30223 d9d278 30220->30223 30221->30218 30224 d9d27c 30223->30224 30228 d9d29f 30224->30228 30232 d9d2b0 30224->30232 30225 d9d28e 30225->30221 30229 d9d2b0 30228->30229 30235 d9d397 30229->30235 30230 d9d2bf 30230->30225 30234 d9d397 2 API calls 30232->30234 30233 d9d2bf 30233->30225 30234->30233 30236 d9d3b9 30235->30236 30237 d9d3dc 30235->30237 30236->30237 30241 d9d640 LoadLibraryExW 30236->30241 30242 d9d630 LoadLibraryExW 30236->30242 30237->30230 30238 d9d3d4 30238->30237 30239 d9d5e0 GetModuleHandleW 30238->30239 30240 d9d60d 30239->30240 30240->30230 30241->30238 30242->30238 29954 48948e0 29955 4894a6b 29954->29955 29957 4894906 29954->29957 29957->29955 29958 4891cc4 29957->29958 29959 4894b60 PostMessageW 29958->29959 29960 4894bcc 29959->29960 29960->29957 29961 4891662 29962 489158c 29961->29962 29963 4891620 29961->29963 29962->29963 29966 48936b8 29962->29966 29984 48936c8 29962->29984 29967 48936c8 29966->29967 29973 48936ea 29967->29973 30002 489418c 29967->30002 30007 4894137 29967->30007 30012 4894153 29967->30012 30016 4893d30 29967->30016 30021 4894091 29967->30021 30026 4893bdf 29967->30026 30030 48942bc 29967->30030 30035 4893ebc 29967->30035 30040 489395a 29967->30040 30046 4893ddb 29967->30046 30051 4893978 29967->30051 30057 4893e26 29967->30057 30062 4893f85 29967->30062 30067 48939c5 29967->30067 30073 4893b2e 29967->30073 29973->29962 29985 48936e2 29984->29985 29986 489418c 2 API calls 29985->29986 29987 4893b2e 2 API calls 29985->29987 29988 48939c5 2 API calls 29985->29988 29989 4893f85 2 API calls 29985->29989 29990 4893e26 2 API calls 29985->29990 29991 48936ea 29985->29991 29992 4893978 2 API calls 29985->29992 29993 4893ddb 2 API calls 29985->29993 29994 489395a 2 API calls 29985->29994 29995 4893ebc 2 API calls 29985->29995 29996 48942bc 2 API calls 29985->29996 29997 4893bdf 2 API calls 29985->29997 29998 4894091 2 API calls 29985->29998 29999 4893d30 2 API calls 29985->29999 30000 4894153 2 API calls 29985->30000 30001 4894137 2 API calls 29985->30001 29986->29991 29987->29991 29988->29991 29989->29991 29990->29991 29991->29962 29992->29991 29993->29991 29994->29991 29995->29991 29996->29991 29997->29991 29998->29991 29999->29991 30000->29991 30001->29991 30079 4890ee8 30002->30079 30083 4890ee0 30002->30083 30003 4894404 30003->29973 30004 4893fe3 30004->30002 30004->30003 30008 4893df2 30007->30008 30009 4893e07 30007->30009 30087 4890868 30008->30087 30091 4890860 30008->30091 30095 4890d49 30012->30095 30099 4890d50 30012->30099 30013 489416d 30017 4893d53 30016->30017 30019 4890ee8 WriteProcessMemory 30017->30019 30020 4890ee0 WriteProcessMemory 30017->30020 30018 4893d74 30019->30018 30020->30018 30022 4894096 30021->30022 30103 48946c8 30022->30103 30108 48946b7 30022->30108 30023 4893bc7 30113 4890fd8 30026->30113 30117 4890fd0 30026->30117 30027 4893bc7 30031 48942df 30030->30031 30033 4890ee8 WriteProcessMemory 30031->30033 30034 4890ee0 WriteProcessMemory 30031->30034 30032 4894461 30033->30032 30034->30032 30036 4893e47 30035->30036 30037 4893ec3 30035->30037 30121 4890e28 30036->30121 30125 4890e20 30036->30125 30041 4893972 30040->30041 30041->29973 30042 4893b49 30041->30042 30129 4891170 30041->30129 30133 4891165 30041->30133 30042->29973 30047 4893de1 30046->30047 30049 4890868 ResumeThread 30047->30049 30050 4890860 ResumeThread 30047->30050 30048 4893e07 30049->30048 30050->30048 30052 4893992 30051->30052 30052->29973 30053 4893b49 30052->30053 30055 4891170 CreateProcessA 30052->30055 30056 4891165 CreateProcessA 30052->30056 30053->29973 30054 4893ba2 30054->29973 30055->30054 30056->30054 30058 4893e38 30057->30058 30060 4890e28 VirtualAllocEx 30058->30060 30061 4890e20 VirtualAllocEx 30058->30061 30059 489424d 30060->30059 30061->30059 30063 4893d53 30062->30063 30064 4893d74 30063->30064 30065 4890ee8 WriteProcessMemory 30063->30065 30066 4890ee0 WriteProcessMemory 30063->30066 30065->30064 30066->30064 30069 48939c9 30067->30069 30068 4893b49 30068->29973 30069->30068 30071 4891170 CreateProcessA 30069->30071 30072 4891165 CreateProcessA 30069->30072 30070 4893ba2 30070->29973 30071->30070 30072->30070 30074 4893b49 30073->30074 30075 4893a85 30073->30075 30074->29973 30075->30074 30077 4891170 CreateProcessA 30075->30077 30078 4891165 CreateProcessA 30075->30078 30076 4893ba2 30076->29973 30077->30076 30078->30076 30080 4890f30 WriteProcessMemory 30079->30080 30082 4890f87 30080->30082 30082->30004 30084 4890f30 WriteProcessMemory 30083->30084 30086 4890f87 30084->30086 30086->30004 30088 48908a8 ResumeThread 30087->30088 30090 48908d9 30088->30090 30090->30009 30092 48908a8 ResumeThread 30091->30092 30094 48908d9 30092->30094 30094->30009 30096 4890d95 Wow64SetThreadContext 30095->30096 30098 4890ddd 30096->30098 30098->30013 30100 4890d95 Wow64SetThreadContext 30099->30100 30102 4890ddd 30100->30102 30102->30013 30104 48946dd 30103->30104 30106 4890d49 Wow64SetThreadContext 30104->30106 30107 4890d50 Wow64SetThreadContext 30104->30107 30105 48946f3 30105->30023 30106->30105 30107->30105 30109 48946c8 30108->30109 30111 4890d49 Wow64SetThreadContext 30109->30111 30112 4890d50 Wow64SetThreadContext 30109->30112 30110 48946f3 30110->30023 30111->30110 30112->30110 30114 4891023 ReadProcessMemory 30113->30114 30116 4891067 30114->30116 30116->30027 30118 4891023 ReadProcessMemory 30117->30118 30120 4891067 30118->30120 30120->30027 30122 4890e68 VirtualAllocEx 30121->30122 30124 4890ea5 30122->30124 30124->30037 30126 4890e68 VirtualAllocEx 30125->30126 30128 4890ea5 30126->30128 30128->30037 30130 48911f9 CreateProcessA 30129->30130 30132 48913bb 30130->30132 30134 48911f9 CreateProcessA 30133->30134 30136 48913bb 30134->30136
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e35b3bf125774e7b504034e6ca015b4c175206603617d70abfe3c6df5b629b5a
                                          • Instruction ID: 6ac7c7d2c8d9bdb9be014c0fdd82adc2cfa1fe2dcf137427a6990db81c88795c
                                          • Opcode Fuzzy Hash: e35b3bf125774e7b504034e6ca015b4c175206603617d70abfe3c6df5b629b5a
                                          • Instruction Fuzzy Hash: 5E21E6B0D046188BEB18CFA7D8557EEBFB6BFC9300F14C06AD409A6265DB740945CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 970 4891165-4891205 972 489123e-489125e 970->972 973 4891207-4891211 970->973 980 4891260-489126a 972->980 981 4891297-48912c6 972->981 973->972 974 4891213-4891215 973->974 975 4891238-489123b 974->975 976 4891217-4891221 974->976 975->972 978 4891223 976->978 979 4891225-4891234 976->979 978->979 979->979 983 4891236 979->983 980->981 982 489126c-489126e 980->982 989 48912c8-48912d2 981->989 990 48912ff-48913b9 CreateProcessA 981->990 984 4891291-4891294 982->984 985 4891270-489127a 982->985 983->975 984->981 987 489127c 985->987 988 489127e-489128d 985->988 987->988 988->988 991 489128f 988->991 989->990 992 48912d4-48912d6 989->992 1001 48913bb-48913c1 990->1001 1002 48913c2-4891448 990->1002 991->984 994 48912f9-48912fc 992->994 995 48912d8-48912e2 992->995 994->990 996 48912e4 995->996 997 48912e6-48912f5 995->997 996->997 997->997 999 48912f7 997->999 999->994 1001->1002 1012 4891458-489145c 1002->1012 1013 489144a-489144e 1002->1013 1015 489146c-4891470 1012->1015 1016 489145e-4891462 1012->1016 1013->1012 1014 4891450 1013->1014 1014->1012 1017 4891480-4891484 1015->1017 1018 4891472-4891476 1015->1018 1016->1015 1019 4891464 1016->1019 1021 4891496-489149d 1017->1021 1022 4891486-489148c 1017->1022 1018->1017 1020 4891478 1018->1020 1019->1015 1020->1017 1023 489149f-48914ae 1021->1023 1024 48914b4 1021->1024 1022->1021 1023->1024 1026 48914b5 1024->1026 1026->1026
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 048913A6
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 99fe16911a794ba61b240de47453c9d001d39da186125c21897fd983595b8fbc
                                          • Instruction ID: b593a0a50261cae51d310442831eb9e3a4b37a9ba127a70fd07e32281c620cd7
                                          • Opcode Fuzzy Hash: 99fe16911a794ba61b240de47453c9d001d39da186125c21897fd983595b8fbc
                                          • Instruction Fuzzy Hash: 1FA15C71D0461ACFEF14DFA8C94479DBBF2AF48314F1886A9E808E7250DB74A985CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1027 4891170-4891205 1029 489123e-489125e 1027->1029 1030 4891207-4891211 1027->1030 1037 4891260-489126a 1029->1037 1038 4891297-48912c6 1029->1038 1030->1029 1031 4891213-4891215 1030->1031 1032 4891238-489123b 1031->1032 1033 4891217-4891221 1031->1033 1032->1029 1035 4891223 1033->1035 1036 4891225-4891234 1033->1036 1035->1036 1036->1036 1040 4891236 1036->1040 1037->1038 1039 489126c-489126e 1037->1039 1046 48912c8-48912d2 1038->1046 1047 48912ff-48913b9 CreateProcessA 1038->1047 1041 4891291-4891294 1039->1041 1042 4891270-489127a 1039->1042 1040->1032 1041->1038 1044 489127c 1042->1044 1045 489127e-489128d 1042->1045 1044->1045 1045->1045 1048 489128f 1045->1048 1046->1047 1049 48912d4-48912d6 1046->1049 1058 48913bb-48913c1 1047->1058 1059 48913c2-4891448 1047->1059 1048->1041 1051 48912f9-48912fc 1049->1051 1052 48912d8-48912e2 1049->1052 1051->1047 1053 48912e4 1052->1053 1054 48912e6-48912f5 1052->1054 1053->1054 1054->1054 1056 48912f7 1054->1056 1056->1051 1058->1059 1069 4891458-489145c 1059->1069 1070 489144a-489144e 1059->1070 1072 489146c-4891470 1069->1072 1073 489145e-4891462 1069->1073 1070->1069 1071 4891450 1070->1071 1071->1069 1074 4891480-4891484 1072->1074 1075 4891472-4891476 1072->1075 1073->1072 1076 4891464 1073->1076 1078 4891496-489149d 1074->1078 1079 4891486-489148c 1074->1079 1075->1074 1077 4891478 1075->1077 1076->1072 1077->1074 1080 489149f-48914ae 1078->1080 1081 48914b4 1078->1081 1079->1078 1080->1081 1083 48914b5 1081->1083 1083->1083
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 048913A6
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 846505fcde709bdc14b6449f4646da8510d9cb98ef3e4fa1b8d878b504d2f809
                                          • Instruction ID: 262f89e0e0ba70dca60e41d8745a9342b77298bbfefb21d13968736215d8176f
                                          • Opcode Fuzzy Hash: 846505fcde709bdc14b6449f4646da8510d9cb98ef3e4fa1b8d878b504d2f809
                                          • Instruction Fuzzy Hash: 56916B71D0461ACFEF14DFA8C94479DBBF2AF48314F0886A9E808E7250DB74A985CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1084 d9d397-d9d3b7 1085 d9d3b9-d9d3c6 call d9c700 1084->1085 1086 d9d3e3-d9d3e7 1084->1086 1093 d9d3c8 1085->1093 1094 d9d3dc 1085->1094 1087 d9d3e9-d9d3f3 1086->1087 1088 d9d3fb-d9d43c 1086->1088 1087->1088 1095 d9d449-d9d457 1088->1095 1096 d9d43e-d9d446 1088->1096 1139 d9d3ce call d9d640 1093->1139 1140 d9d3ce call d9d630 1093->1140 1094->1086 1097 d9d459-d9d45e 1095->1097 1098 d9d47b-d9d47d 1095->1098 1096->1095 1102 d9d469 1097->1102 1103 d9d460-d9d467 call d9c70c 1097->1103 1101 d9d480-d9d487 1098->1101 1099 d9d3d4-d9d3d6 1099->1094 1100 d9d518-d9d5d8 1099->1100 1134 d9d5da-d9d5dd 1100->1134 1135 d9d5e0-d9d60b GetModuleHandleW 1100->1135 1105 d9d489-d9d491 1101->1105 1106 d9d494-d9d49b 1101->1106 1104 d9d46b-d9d479 1102->1104 1103->1104 1104->1101 1105->1106 1108 d9d4a8-d9d4b1 call d9c71c 1106->1108 1109 d9d49d-d9d4a5 1106->1109 1115 d9d4be-d9d4c3 1108->1115 1116 d9d4b3-d9d4bb 1108->1116 1109->1108 1117 d9d4e1-d9d4e5 1115->1117 1118 d9d4c5-d9d4cc 1115->1118 1116->1115 1141 d9d4e8 call d9d940 1117->1141 1142 d9d4e8 call d9d910 1117->1142 1118->1117 1120 d9d4ce-d9d4de call d9c72c call d9c73c 1118->1120 1120->1117 1121 d9d4eb-d9d4ee 1124 d9d511-d9d517 1121->1124 1125 d9d4f0-d9d50e 1121->1125 1125->1124 1134->1135 1136 d9d60d-d9d613 1135->1136 1137 d9d614-d9d628 1135->1137 1136->1137 1139->1099 1140->1099 1141->1121 1142->1121
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00D9D5FE
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: c56a09d42acd48d2d461194de587826deb2918f846cd2b65a440b58c0ee7c97c
                                          • Instruction ID: 3933e7cd9d8c9c2dce114bd03759bb14cf32fca4dac24ac0f22b417696689409
                                          • Opcode Fuzzy Hash: c56a09d42acd48d2d461194de587826deb2918f846cd2b65a440b58c0ee7c97c
                                          • Instruction Fuzzy Hash: 00812070A00B058FDB24DF69D14175ABBF2FF88304F148A2AD48AD7B50DB75E849CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1143 549f268-549f27f 1144 549f288-549f28e 1143->1144 1145 549f281-549f286 1143->1145 1146 549f291-549f295 1144->1146 1145->1146 1147 549f29e-549f2a4 1146->1147 1148 549f297-549f29c 1146->1148 1149 549f2a7-549f2ab 1147->1149 1148->1149 1150 549f2ad-549f2ca 1149->1150 1151 549f2cf-549f2d3 1149->1151 1162 549f4ef-549f4f8 1150->1162 1152 549f2d5-549f2f2 1151->1152 1153 549f2f7-549f302 1151->1153 1152->1162 1155 549f30a-549f310 1153->1155 1156 549f304-549f307 1153->1156 1157 549f4fb-549f79e 1155->1157 1158 549f316-549f326 1155->1158 1156->1155 1165 549f328-549f346 1158->1165 1166 549f34b-549f370 1158->1166 1171 549f4af-549f4b2 1165->1171 1173 549f4b8-549f4bd 1166->1173 1174 549f376-549f37f 1166->1174 1171->1173 1171->1174 1173->1157 1176 549f4bf-549f4c2 1173->1176 1174->1157 1177 549f385-549f39d 1174->1177 1179 549f4c4 1176->1179 1180 549f4c6-549f4c9 1176->1180 1184 549f3af-549f3c6 1177->1184 1185 549f39f-549f3a4 1177->1185 1179->1162 1180->1157 1183 549f4cb-549f4ed 1180->1183 1183->1162 1193 549f3c8 1184->1193 1194 549f3ce-549f3d8 1184->1194 1185->1157 1188 549f3aa-549f3ad 1185->1188 1188->1184 1190 549f3dd-549f3e2 1188->1190 1190->1157 1195 549f3e8-549f3f7 1190->1195 1193->1194 1194->1173 1201 549f3f9 1195->1201 1202 549f3ff-549f40f 1195->1202 1201->1202 1202->1157 1205 549f415-549f418 1202->1205 1205->1157 1206 549f41e-549f421 1205->1206 1208 549f423-549f427 1206->1208 1209 549f472-549f484 1206->1209 1208->1157 1210 549f42d-549f433 1208->1210 1209->1171 1215 549f486-549f49b 1209->1215 1213 549f435-549f43b 1210->1213 1214 549f444-549f44a 1210->1214 1213->1157 1216 549f441 1213->1216 1214->1157 1217 549f450-549f45c 1214->1217 1222 549f49d 1215->1222 1223 549f4a3-549f4ad 1215->1223 1216->1214 1225 549f464-549f470 1217->1225 1222->1223 1223->1173 1225->1209
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'kq
                                          • API String ID: 0-3255046985
                                          • Opcode ID: c6a3aa7bc939465508e082360702d40f2ec40d9e61e23d5d75366b815f863302
                                          • Instruction ID: d0b80f70abf7e328b101105d12b44b67b51a2157e42e8090fff9b86e79615e0a
                                          • Opcode Fuzzy Hash: c6a3aa7bc939465508e082360702d40f2ec40d9e61e23d5d75366b815f863302
                                          • Instruction Fuzzy Hash: 04E17F74A00209DFCF09EFB8C594AAEBFB2FB89310F108455D905A7368DB35AD89DB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1251 d958ec-d958ee 1252 d958f0 1251->1252 1253 d958f2 1251->1253 1252->1253 1254 d958f4 1253->1254 1255 d958f6-d959b9 CreateActCtxA 1253->1255 1254->1255 1257 d959bb-d959c1 1255->1257 1258 d959c2-d95a1c 1255->1258 1257->1258 1265 d95a2b-d95a2f 1258->1265 1266 d95a1e-d95a21 1258->1266 1267 d95a31-d95a3d 1265->1267 1268 d95a40 1265->1268 1266->1265 1267->1268 1270 d95a41 1268->1270 1270->1270
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00D959A9
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: b4b6b5688d96be9bccdc0d6cd314bf9dfab8531fb10d3aa9cca81345ce895837
                                          • Instruction ID: 02cdb74fff8c581d6a1c2824a70addf3610264570f51fe42a8c8ba3884244fb6
                                          • Opcode Fuzzy Hash: b4b6b5688d96be9bccdc0d6cd314bf9dfab8531fb10d3aa9cca81345ce895837
                                          • Instruction Fuzzy Hash: 804100B0D00619CFDF24CFA9D884BDDBBB5BF48304F24816AD408AB255DB75694ACFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1271 d944b0-d959b9 CreateActCtxA 1274 d959bb-d959c1 1271->1274 1275 d959c2-d95a1c 1271->1275 1274->1275 1282 d95a2b-d95a2f 1275->1282 1283 d95a1e-d95a21 1275->1283 1284 d95a31-d95a3d 1282->1284 1285 d95a40 1282->1285 1283->1282 1284->1285 1287 d95a41 1285->1287 1287->1287
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00D959A9
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: d6e72aad16902809d4ce39bf812d5b6dea9df0d87a178ffc9ce699352c9f3c44
                                          • Instruction ID: 9bcfced290bfe3789d74307fa113d56b9e8c6d5ab6e379421effbd10c7c11f1e
                                          • Opcode Fuzzy Hash: d6e72aad16902809d4ce39bf812d5b6dea9df0d87a178ffc9ce699352c9f3c44
                                          • Instruction Fuzzy Hash: 6441D1B0C00719CBDF24DFA9C884B9DBBF5BF48304F24816AD408AB255DB75A946CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1288 4890ee0-4890f36 1290 4890f38-4890f44 1288->1290 1291 4890f46-4890f85 WriteProcessMemory 1288->1291 1290->1291 1293 4890f8e-4890fbe 1291->1293 1294 4890f87-4890f8d 1291->1294 1294->1293
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04890F78
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 203ecf74e29f1f4a88ebc80b1e2f19e52a0cfe19478d3ee9f4a3dcda3b7c5a8f
                                          • Instruction ID: a43f365c0c311c6247ce75301763bfffadf800b95417467bd7d38d71e87628fd
                                          • Opcode Fuzzy Hash: 203ecf74e29f1f4a88ebc80b1e2f19e52a0cfe19478d3ee9f4a3dcda3b7c5a8f
                                          • Instruction Fuzzy Hash: 9C2146B1900249CFCB10CFA9C884BDEBBF1FF48310F148829E959A7290C778A944CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1298 4890ee8-4890f36 1300 4890f38-4890f44 1298->1300 1301 4890f46-4890f85 WriteProcessMemory 1298->1301 1300->1301 1303 4890f8e-4890fbe 1301->1303 1304 4890f87-4890f8d 1301->1304 1304->1303
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04890F78
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: ef0248013da6598e1bc552d87ae1f4a70c8b0cb90a6bce9756eae46bb8bafa31
                                          • Instruction ID: 408941f81ff1c4ceb54fa4a56946e6c0955903b8061dd970d702c32f604ebb13
                                          • Opcode Fuzzy Hash: ef0248013da6598e1bc552d87ae1f4a70c8b0cb90a6bce9756eae46bb8bafa31
                                          • Instruction Fuzzy Hash: 892126B19003599FCB10CFA9C985BDEBBF5FF48310F148829E959A7250C778A944CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04890DCE
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: e2bc235716d8b69eb95bbb47c85d131c99a02f0c22828698711db92de1b7b1c3
                                          • Instruction ID: 003a4d32084854a510264707282ddcb8ac4c9c9d700a5cc5a2f3db6f9b412388
                                          • Opcode Fuzzy Hash: e2bc235716d8b69eb95bbb47c85d131c99a02f0c22828698711db92de1b7b1c3
                                          • Instruction Fuzzy Hash: 882125B19003098FDB10DFAAC4857EEBFF5EF88324F14842AD459A7241CB78A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04891058
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: c11b209341cb37c69d22f4177b85f729713ee51c6a0522b00b1e7aca756be260
                                          • Instruction ID: e687fbe2a5da70682a7d4a10095ff04e271422df6d44339c13c81feb92092a96
                                          • Opcode Fuzzy Hash: c11b209341cb37c69d22f4177b85f729713ee51c6a0522b00b1e7aca756be260
                                          • Instruction Fuzzy Hash: 8D2139B1D003599FDB10DFAAC884BDEBBF5FF48320F108829E959A7251C7799944CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D9FC46,?,?,?,?,?), ref: 00D9FD07
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 2a18cab5334a78e40d56c1118fb64a5fb078ec02249d8965ad391eb5cc15c978
                                          • Instruction ID: d23f19265253e2e0c3c24b4d665c5c4a82fd3bdbe2f3ebff8bd80fc578957136
                                          • Opcode Fuzzy Hash: 2a18cab5334a78e40d56c1118fb64a5fb078ec02249d8965ad391eb5cc15c978
                                          • Instruction Fuzzy Hash: 5B21E3B5D002499FDB10CFAAD984ADEBFF4EB48310F14842AE958A7311D374A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04890DCE
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 66de8f96d21f7547ef37ecb2d69230488fa55323b5f782a0092a2eed3bb63a31
                                          • Instruction ID: 58155cee6771f8a1467e24d42404e4a909c549b6c51ce174fc311f18a2f8219a
                                          • Opcode Fuzzy Hash: 66de8f96d21f7547ef37ecb2d69230488fa55323b5f782a0092a2eed3bb63a31
                                          • Instruction Fuzzy Hash: 84212C71D003098FDB10DFAAC4857EEBBF4EF48324F148429D559A7241C778A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04891058
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: b3996fb893f7793dfb34c9a3984f60ccac496c615ea0ae1f5e39faed1a4a5a91
                                          • Instruction ID: dec20d7f870520ce972ee3813133417e8c9b03471569a0783ced553bfdc7b938
                                          • Opcode Fuzzy Hash: b3996fb893f7793dfb34c9a3984f60ccac496c615ea0ae1f5e39faed1a4a5a91
                                          • Instruction Fuzzy Hash: 662128B1D003599FDB10DFAAC944BDEBBF5FF48320F108829E558A7250C779A944CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D9D679,00000800,00000000,00000000), ref: 00D9D88A
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: ef73ce7951ce1e86a63261b4528d7595e8e1fb34540c9b81f387253084a596f4
                                          • Instruction ID: aaf4357c3e7179d84738b8f8e5a2d6fd8e874bd3172f50c000743d91b14a46eb
                                          • Opcode Fuzzy Hash: ef73ce7951ce1e86a63261b4528d7595e8e1fb34540c9b81f387253084a596f4
                                          • Instruction Fuzzy Hash: 451112B6D002099FDB10CF9AD848BDEFBF5EB48324F14842AE519A7311C375A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04890E96
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 3a104969626a98aa1ce2c705d4ac3f4dbd50f913333aa61c78b7f3af22ef5917
                                          • Instruction ID: eeb9538ae2b4cb77d50f60da9a06efea1a1d44a82a106b761e51ead255da1197
                                          • Opcode Fuzzy Hash: 3a104969626a98aa1ce2c705d4ac3f4dbd50f913333aa61c78b7f3af22ef5917
                                          • Instruction Fuzzy Hash: 511136B28002498FDB10DFA9C944BEFBFF5AF88320F148819D555A7260C735A944CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04890E96
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 2e42bafc6ac8b195c06068bae61c405e0dea26ba65286888130dd0331c5503ef
                                          • Instruction ID: b81d8a455e45ad5dbe8d8b5929eda363dd13795e4a0572128b2522227b4496a2
                                          • Opcode Fuzzy Hash: 2e42bafc6ac8b195c06068bae61c405e0dea26ba65286888130dd0331c5503ef
                                          • Instruction Fuzzy Hash: E61126729002499FCB10DFAAC844BDFBFF5EF48320F148819E555A7250C775A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D9D679,00000800,00000000,00000000), ref: 00D9D88A
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: c6f13a13f58d12d714347acdf775e18e09b411ce9e019d052509af0e062ee301
                                          • Instruction ID: 43af16576f1e516d9a40eb36d57d3c7392bd51809ec76315973bcb8a79e78c25
                                          • Opcode Fuzzy Hash: c6f13a13f58d12d714347acdf775e18e09b411ce9e019d052509af0e062ee301
                                          • Instruction Fuzzy Hash: AA1150B6C003098FCB10CF9AD444BDEFBF5EB48320F10842AD918A7250C3B9A944CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 26cf9bb47da07bdd131f1e7d167e7965a1d6786bd79d724cb940c14a6b06fab3
                                          • Instruction ID: b5b0de06a20d9278a6c8e181445bbf42cd923464b1d24967ac336e059a55fdeb
                                          • Opcode Fuzzy Hash: 26cf9bb47da07bdd131f1e7d167e7965a1d6786bd79d724cb940c14a6b06fab3
                                          • Instruction Fuzzy Hash: 711128B1D002498BDB10DFAAC8457DEFBF4EB88324F248829D559A7250CA75A944CF95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 4dc906d192e56aed6c12a59efd1e0c331f0de2e20285ffe4930f9710ccac0f52
                                          • Instruction ID: 48ea968e9eb086f4fabe59ef8ea3fc44922ecad8dc2645b786198d8f55f68b77
                                          • Opcode Fuzzy Hash: 4dc906d192e56aed6c12a59efd1e0c331f0de2e20285ffe4930f9710ccac0f52
                                          • Instruction Fuzzy Hash: 961158B2D002498FDB10DFAAC8457DEFBF4EF88324F248819D559A7250C778A944CF95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 04894BBD
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: f497cff50eea846343616203c3d3ff67714a2cf33b17ff7af8201eaa9114ea55
                                          • Instruction ID: 6ec4b0e8e256e9c2df757fa7b87d86cbf3de630a44ad0562b68ab62364d1dc17
                                          • Opcode Fuzzy Hash: f497cff50eea846343616203c3d3ff67714a2cf33b17ff7af8201eaa9114ea55
                                          • Instruction Fuzzy Hash: B61133B5804308DFDB10DF9AD888BDEBBF8EB48324F108859E558A7300C375A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 04894BBD
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1925003468.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_4890000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 33d86cebcfec1c4dcfc5404ebcf3b0385ed5e713ecd30eb1bff0a1d25beacaa9
                                          • Instruction ID: 2f020e664fee0cf1a83a16893976a2fb0533de65a1a1c9ebd51ffe146c23120b
                                          • Opcode Fuzzy Hash: 33d86cebcfec1c4dcfc5404ebcf3b0385ed5e713ecd30eb1bff0a1d25beacaa9
                                          • Instruction Fuzzy Hash: 571143B5804348CFDB10CF99D984BDEBFF4EB08324F208869D554A7640C379A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00D9D5FE
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1920756748.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_d90000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 3aad0d466a8f6cc1a05bce00781a7fd493461646b30f3b0430a35128a606c2cf
                                          • Instruction ID: 2647fe2fb6f5fef33a8c09c16b97a1ec71aff52d33bcf01154a1ebdc8ff6cd60
                                          • Opcode Fuzzy Hash: 3aad0d466a8f6cc1a05bce00781a7fd493461646b30f3b0430a35128a606c2cf
                                          • Instruction Fuzzy Hash: AF111DB6C002498FCB10CF9AD844BDEFBF5EF89324F14842AD828A7210C379A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: d3142c0fc4aa2322e354b5eed14500b3b234bc100cbaa5616c5d447ff1213247
                                          • Instruction ID: 491172c4c7b86985382642462067c22038cc63ff6c31e7a667be3fda693c7269
                                          • Opcode Fuzzy Hash: d3142c0fc4aa2322e354b5eed14500b3b234bc100cbaa5616c5d447ff1213247
                                          • Instruction Fuzzy Hash: 4131EA74E04208CBDF18CFAAC9557DEBBB6FF89300F10902AD41AAB355DB745906CB51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: 9cd81966d7e9d24fe90cd6b69d1b9b6121653523044b5484082c578a62108ad0
                                          • Instruction ID: e8cced0bc127aafb763ec4e72f8c6a4795d7157e141400e2f7a3b7c44e53d9f1
                                          • Opcode Fuzzy Hash: 9cd81966d7e9d24fe90cd6b69d1b9b6121653523044b5484082c578a62108ad0
                                          • Instruction Fuzzy Hash: 2331A974E042188BDF18DFAAC9456EEBBB6FF89300F10902AD41AAB355DB745906CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 2
                                          • API String ID: 0-450215437
                                          • Opcode ID: 27f7db79a5c201f8566714e93b30baebf6d1175ec1f81533be0386d34f538fc5
                                          • Instruction ID: 743238084e17cd04c94e7436fb0b00f42f98160fb8a0cc6c47a33d728290626c
                                          • Opcode Fuzzy Hash: 27f7db79a5c201f8566714e93b30baebf6d1175ec1f81533be0386d34f538fc5
                                          • Instruction Fuzzy Hash: 89219130754214DFCB2C8B189816BBA3E66FBC7701F25C1ABE0164F3A6DA36C8428795
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: b69dedfa5f43a43864b2837b7f0eadbba20a79657e550bf4a166f9d01ee889b6
                                          • Instruction ID: d57e5d19b3e6a8c9620a4c60ec6db0786fc7b78fc325a5c7bca76c30fd1ac10c
                                          • Opcode Fuzzy Hash: b69dedfa5f43a43864b2837b7f0eadbba20a79657e550bf4a166f9d01ee889b6
                                          • Instruction Fuzzy Hash: DB311A34A05128CFCB35DF24D945BA8BBBAEFC9301F00819AD40EA774ADE745E868F50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: ae00fdfe7164f5473ca67e938bc1346b51d40b95cecf9e9a7eb27909713b425e
                                          • Instruction ID: df1f7e659affe23c6bba7ec1f17a5c2d479fd22dd186678b592ac9e587370c96
                                          • Opcode Fuzzy Hash: ae00fdfe7164f5473ca67e938bc1346b51d40b95cecf9e9a7eb27909713b425e
                                          • Instruction Fuzzy Hash: E4115075E002098FCF04DFE8D9849ADFBB2FB88314F20816AE919AB355D6316956DF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b3b34365c9bd247c6faca0b8ed32e6e26086d177b80946dc120d433cd6863a5
                                          • Instruction ID: 164eb13c7a4cfaa8d2b13fa6d87047ab4fa2ec9e3e0f0d9e1f7cc332f43880e8
                                          • Opcode Fuzzy Hash: 2b3b34365c9bd247c6faca0b8ed32e6e26086d177b80946dc120d433cd6863a5
                                          • Instruction Fuzzy Hash: D7A1FA74E052198FCF04DBA9C5815EDFBB6FF89301F10962AD419AB356DB30A946CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 41f8cc51a8ca1f82a314973fde9614d962c746b8cf2309ffac02e7d3b80ce11f
                                          • Instruction ID: afa6824b7a41ad0b279516fdb6e593d93ae9451921cd9c0c8e1c064883e7200c
                                          • Opcode Fuzzy Hash: 41f8cc51a8ca1f82a314973fde9614d962c746b8cf2309ffac02e7d3b80ce11f
                                          • Instruction Fuzzy Hash: 0F618970E106189FDB08DBA9C8427FEBAA2FF85301F1082A6F515A63D5DB349942CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ceb187cb33d562ff2314b09df36ccef0eaf680ded02ae5902b5ba5689238721
                                          • Instruction ID: 24cb5b58f61bdfabf3b76d1b916acc3b775584277c357a45683a7b2c01069717
                                          • Opcode Fuzzy Hash: 1ceb187cb33d562ff2314b09df36ccef0eaf680ded02ae5902b5ba5689238721
                                          • Instruction Fuzzy Hash: 5E51E474D092198FCF08CFAAE4466EEBFF6EB89340F24D06AD419A7252D7345942CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a2f4e4b1954d3cc591c020f5b8639d38a69e642bebedb6ca76006a00934e244
                                          • Instruction ID: 81bcb334886724b1a527328bdf1742dfb9b486022ee9bf5dda9219885216284c
                                          • Opcode Fuzzy Hash: 6a2f4e4b1954d3cc591c020f5b8639d38a69e642bebedb6ca76006a00934e244
                                          • Instruction Fuzzy Hash: 0441E476B00208AFDF08DF65DD46AEE7BFAEFC5204F1584BAE405D7211EA30AD058790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ddd36b9e63d6fafd5a85afde317db4850a8642fb287fd10963d6be27bce6710
                                          • Instruction ID: 998d42ea844414660d274649433c7fd0c10c6aa699b468d36a8ba0d4e6e868d3
                                          • Opcode Fuzzy Hash: 7ddd36b9e63d6fafd5a85afde317db4850a8642fb287fd10963d6be27bce6710
                                          • Instruction Fuzzy Hash: 7851B574D09218CFCB64CFA4D585AECBBB6FF49311F20919AD809A7356C731A985CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc17b54a8e793605670b1b8d230bfafb428c12abfdda2f75b1d0219bccf7954b
                                          • Instruction ID: bd8537959d31eb0157e1521e2e7ed0215c0ef3f2a21589ec7c70132bcd976373
                                          • Opcode Fuzzy Hash: cc17b54a8e793605670b1b8d230bfafb428c12abfdda2f75b1d0219bccf7954b
                                          • Instruction Fuzzy Hash: 25412E74906255CFCB18DF68E1899AEBFF9FB89301B00A05EE40ADB356DB34A841CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919667593.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a5d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f6c0761f36b427b6fcb5623b2ca11cd0a94d94ad20106d3e92564c572da8f17
                                          • Instruction ID: 1e90c8dd92851f6b122fd889093be1cdc81c04d7c8eca3006b0a656c7f5359b6
                                          • Opcode Fuzzy Hash: 9f6c0761f36b427b6fcb5623b2ca11cd0a94d94ad20106d3e92564c572da8f17
                                          • Instruction Fuzzy Hash: CD210071604600DFDB25DF14D9C0B27BF66FB98315F208669ED094B256C336D85ACAA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919667593.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a5d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f35f9f8a84db86ce9f84e364d6168a70c97dd3575658ad54e214664ea0035fc
                                          • Instruction ID: 42c8c19858d1a8cc5c3c72c7a70d21c9d53841c7ca56cb70f137093431caeaa3
                                          • Opcode Fuzzy Hash: 9f35f9f8a84db86ce9f84e364d6168a70c97dd3575658ad54e214664ea0035fc
                                          • Instruction Fuzzy Hash: 9E2125B1500204EFDB25DF14D9C0B26BF75FB98325F20C569ED094F256C33AE85ACAA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 390d75966752698d2da2d07752527133a0df33a9fbcf556f71316eefc611c50e
                                          • Instruction ID: a84a6f13e98d3352303a16f12b7c6b1f29b313bf2d92f2fa01b6ea3f6bfdbb75
                                          • Opcode Fuzzy Hash: 390d75966752698d2da2d07752527133a0df33a9fbcf556f71316eefc611c50e
                                          • Instruction Fuzzy Hash: EE21C974D09219CFCF08CFA6D985AEDBBF5BF49301F24A46AE406AB261D7349901CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919729792.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a6d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35a108266f4ce20443ba847648eef9ea376cb8486f447ac51754ff12c51a2275
                                          • Instruction ID: cc2a475ffcf47cc462d7e0dd2d542ef55e43e4e3ca01a5abf78d41e67d921716
                                          • Opcode Fuzzy Hash: 35a108266f4ce20443ba847648eef9ea376cb8486f447ac51754ff12c51a2275
                                          • Instruction Fuzzy Hash: 502104B1A44200EFCB04DF24D9D0B66BBB5FB94314F24C56DD8094F296C376D846CAA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919729792.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a6d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29bf5fbae47b8c2c574ce153e783809318c38f27d2702f4ff5cc9aae31da6cf6
                                          • Instruction ID: 7b83a64d2e8bde2bc7a9cdd021f894bdc47c320910c24c16c20f2f42e76aaa9c
                                          • Opcode Fuzzy Hash: 29bf5fbae47b8c2c574ce153e783809318c38f27d2702f4ff5cc9aae31da6cf6
                                          • Instruction Fuzzy Hash: D521FF75A04240EFCB14DF24D984B26BFB5FB88354F24C569E80A4B296C33BD847CAA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ee707ab2a29f2a14f50bc4216fa5d9cecc6ba9131834f24aac4be669ad03928
                                          • Instruction ID: 557fa8b33701941dc4e07b9ecf1c2f347c43043caca1a728e730236d82626ded
                                          • Opcode Fuzzy Hash: 7ee707ab2a29f2a14f50bc4216fa5d9cecc6ba9131834f24aac4be669ad03928
                                          • Instruction Fuzzy Hash: 1E2128B4D0D249CFCB49CFA9D586AEEBFF5EF4A300F21509AD409A7712C2309A41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4a2c54cc6e3390fc28f7f3308cc438ac68e56a3161c1ba862e233880391211e4
                                          • Instruction ID: 6a9350604f8144e8825dd8b9594b3e56cb690fa001673ae7e67decb33c4eeb66
                                          • Opcode Fuzzy Hash: 4a2c54cc6e3390fc28f7f3308cc438ac68e56a3161c1ba862e233880391211e4
                                          • Instruction Fuzzy Hash: E7215B35A4410A8FCF04DBA9C5416EEBBBAFF89300F20866AD41577755DB306E4A8BA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2a19662abdb08bb74ee597c56da24687bd05e37cc3b6f58cbb727966360722cc
                                          • Instruction ID: 7d31da179e58c15df2f4ffeb70c12232a093da2c39775a9988deb68a82d999eb
                                          • Opcode Fuzzy Hash: 2a19662abdb08bb74ee597c56da24687bd05e37cc3b6f58cbb727966360722cc
                                          • Instruction Fuzzy Hash: 90216A30B54610DFDB288B14D906BBA7F62FBC7701F2581ABE51A4F2A2D676C8428785
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac600e934aca654560412618726591eb4a0d422a1c0b378d816990b88eefb55c
                                          • Instruction ID: a33285d1eb2956e25615ee34c5bb506916c68a3b6d84dc912c2deda14810b6ce
                                          • Opcode Fuzzy Hash: ac600e934aca654560412618726591eb4a0d422a1c0b378d816990b88eefb55c
                                          • Instruction Fuzzy Hash: 45216D35E4021A8FCF04DBA9C5416EEBBBAFF89300F10856AD41577355EB306E4A8BA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7c627322027dd3305606559593742318f0e263d581c062acfd87c41a8f8b97f9
                                          • Instruction ID: 0a10e0343bbc09e07f0953efdb82b9a7ce9c56b4b42a2353a4167ead71f1934a
                                          • Opcode Fuzzy Hash: 7c627322027dd3305606559593742318f0e263d581c062acfd87c41a8f8b97f9
                                          • Instruction Fuzzy Hash: 0611C434B00218ABCF1D9A799D11BBBBAA7FB84750F14852AE816DB340EA71CD49C7D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7121eab11af61c7f3d04867248aa7e6ad81071165b7d9005e3e96a2c8e6f548e
                                          • Instruction ID: 534fd3005e938f96b62a4599e033edf575c5aa7c4b1955b1dc1202ce32afac08
                                          • Opcode Fuzzy Hash: 7121eab11af61c7f3d04867248aa7e6ad81071165b7d9005e3e96a2c8e6f548e
                                          • Instruction Fuzzy Hash: 1B21C9B4D08209DFCB48CF99D185AEEBBF5EB49300F60909AD819A7715D7309A41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bcd116afd9565bde5cab58aaff5368402c9b288a9e7cd1e8e1bf3a38e5df473
                                          • Instruction ID: f8838b6970b19fc3f02aa95a78224b37c3760e9fa08bc4741a7010404bdfcc4f
                                          • Opcode Fuzzy Hash: 1bcd116afd9565bde5cab58aaff5368402c9b288a9e7cd1e8e1bf3a38e5df473
                                          • Instruction Fuzzy Hash: 3F21C3B1D046188BEB18CF9BD8457EEFAB6BFC8300F14C06AD419A6254DB74094A8F90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a5656ff69b8b8aa7ec3a87f69224be186fe276c2534684d8b7e2c2445c3d127
                                          • Instruction ID: ca299071dd89a887417cd0adb43afd3f4736da7d1d34455bdfe676ee0a476e3a
                                          • Opcode Fuzzy Hash: 0a5656ff69b8b8aa7ec3a87f69224be186fe276c2534684d8b7e2c2445c3d127
                                          • Instruction Fuzzy Hash: 3C11297090D248DFCB18CFA9E5819EDBFF5EF49300F1491D6C41997216D6709A058B41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fdcdcf3904edbc1ed5a45b78161403e5aca1dc103ffab09a7d73050495073f8a
                                          • Instruction ID: 7d28d1b1808f401373b8fd86fc4747ca9199308ad02212e58c36cd22be08306a
                                          • Opcode Fuzzy Hash: fdcdcf3904edbc1ed5a45b78161403e5aca1dc103ffab09a7d73050495073f8a
                                          • Instruction Fuzzy Hash: BE21D3B5D042499FCB10DF9AD844ADEBFF4FB48354F10842AE919A7310C375A954CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919667593.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a5d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: bd115a635606b791df834fb76cd9c19e091d9c3257d36068aa137bbf3a0a67b6
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 4311D076504680CFDB16CF10D9C4B16BF72FB94324F24C6A9DD094B266C33AD85ACBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919667593.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a5d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: bfe54f2c8eaaff998692f10a5dc1f85e155bdeb1fb5bf2ace57b02cd894ddb66
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 9A110372404240DFDB16CF00D5C4B16BF72FB94324F24C2A9DC090B256C33AE85ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eda8e9be6eefd88ed5a936a4c4f4b40e9a67224c9f64d6d3e1da8bb3ad759a7a
                                          • Instruction ID: 65c908f0737a80ea71ce8a3fda109c27d666d52cdbb99679772254cadeccda64
                                          • Opcode Fuzzy Hash: eda8e9be6eefd88ed5a936a4c4f4b40e9a67224c9f64d6d3e1da8bb3ad759a7a
                                          • Instruction Fuzzy Hash: A921D3B6D002499FCB10CF9AD845ADEBFF4FB48354F10841AE959A7310C379A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a32fcbcd391f21280e12890ceea93000df02f36f15262377b11746b36fd99a7
                                          • Instruction ID: df07fc61f3edbc91ca0e99d469f8aa5e77860a90e6571f18421169f3486a8b83
                                          • Opcode Fuzzy Hash: 7a32fcbcd391f21280e12890ceea93000df02f36f15262377b11746b36fd99a7
                                          • Instruction Fuzzy Hash: E7212C34A05324CFCB74DB24D954BA9B7BAEFC6301F00819D944AA7B0ACF745E858F51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919729792.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a6d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: d47bc4b3893ebaeee1f1fb2eac39beaf73846b62c990f549068bc78fbfdb63e8
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: DA11DD75A04280CFCB01CF20D5D4B55BFB2FB84318F28C6AAD8094F256C33AD80ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1919729792.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_a6d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: f1207bd946ca82f01e8fec816543dec262a8304aff231f08e99448f49b38fd32
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: E7118E75A04280DFDB15CF14D5C4B15BB71FB84318F24C6AAD84A4B656C33AD84ACB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40940c35b93d804bcfe2a7182dcc2e84c0e5cea12f419ce8b2008af54d8d87dd
                                          • Instruction ID: 7c581aadd26d0cdbbb3f4ca6a0362a890d38429060782a20987e3acdfea91459
                                          • Opcode Fuzzy Hash: 40940c35b93d804bcfe2a7182dcc2e84c0e5cea12f419ce8b2008af54d8d87dd
                                          • Instruction Fuzzy Hash: 3D11C6749082488FCB04DFA5C54559DBBB6FF8A301F209159D41AAB356D7386D06CF41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b7e3912935cabc4f133f46b47247176f8404ecc7d2b499ada2d4b2b13b3814b
                                          • Instruction ID: e6536c0b5d21e94cbc0818e4b1a8c346a28327ddf6b1ba6974618e08710468ca
                                          • Opcode Fuzzy Hash: 3b7e3912935cabc4f133f46b47247176f8404ecc7d2b499ada2d4b2b13b3814b
                                          • Instruction Fuzzy Hash: 82116D75908244EFCB04DFA4C595AEDBFF9EF59300F2590D9E4099B262D7309E01DB40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49dd2a36b2cb30fcba82736c79bd2c731998b325b2c384ebaede428d2badd1b0
                                          • Instruction ID: c7b5d5ec3d0eb23d2a73f7b9fcb90b4bc586cb3870cf94a13c41ff14817e0a62
                                          • Opcode Fuzzy Hash: 49dd2a36b2cb30fcba82736c79bd2c731998b325b2c384ebaede428d2badd1b0
                                          • Instruction Fuzzy Hash: A901B17094C254DFCF0CCB55C5C6AE9BFBAAF4A310B1491EBD00AAB622D7308E46DB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a3554d4007af61d224155506b0a62f82e95045186bd8fdbac71740fa73d1acf0
                                          • Instruction ID: 4fe83f1b3139d1333ef9fb5ce8ec951e63f7a26d4a1e4be2a20bc83160b2a91d
                                          • Opcode Fuzzy Hash: a3554d4007af61d224155506b0a62f82e95045186bd8fdbac71740fa73d1acf0
                                          • Instruction Fuzzy Hash: 88115E34905154CFCB38DF58D985AA8BBB9FF88301F0491AED40A97756DB306D81CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9e09cba28281a8132d5041885942ea5d3a2c88b7e85ca0cb5458af05f7a528a
                                          • Instruction ID: 448aa726c6fa187fd406197ea17a871dbb0bcc6f91533dafe4e82186abb15c83
                                          • Opcode Fuzzy Hash: f9e09cba28281a8132d5041885942ea5d3a2c88b7e85ca0cb5458af05f7a528a
                                          • Instruction Fuzzy Hash: A1F01276A001047FDF09EF5AD841EEB7BBAEBC4354B05C16AE918D7315D630D9058B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 12263e2b6d0edf2acf177eca027e22e2b660e3e06edfc0828acfbaad2a6425f3
                                          • Instruction ID: 9cd845b336df85bf7f0dc02ba5c9696825d2523ab2fb495f9b51ccf93658570c
                                          • Opcode Fuzzy Hash: 12263e2b6d0edf2acf177eca027e22e2b660e3e06edfc0828acfbaad2a6425f3
                                          • Instruction Fuzzy Hash: EEF03170948258DBCB08CB55C58AAF9BFBEBF99310F14A1A6940A57212D7309E45DB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9eaac881c781c96013b2c412310fafc02a329ae9f452bd26e922356112a76e28
                                          • Instruction ID: efbb65f5c886237558e1cb5fc9ae14ddacb3d1171b96c38d20d6d7ce1914d52a
                                          • Opcode Fuzzy Hash: 9eaac881c781c96013b2c412310fafc02a329ae9f452bd26e922356112a76e28
                                          • Instruction Fuzzy Hash: 29F012766001046F9F09EF5AD841CAABBBAEBC4354705C46AE918D7214D631D9158B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 350f085c7fb5a2fd1774b3e3b762596466776a9825e8755b8b446d779151f2d7
                                          • Instruction ID: 79fc970f0b97100ac4394ab9e29bf127383f0238faa5b738b13ca51713bf5acf
                                          • Opcode Fuzzy Hash: 350f085c7fb5a2fd1774b3e3b762596466776a9825e8755b8b446d779151f2d7
                                          • Instruction Fuzzy Hash: 24F02430788344AFDF08EB74CA16AAD7FE9EB91204F2504EAE406C3251EA30DC068315
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9855bd9cf542bfb39dab74abd97aad9a108727a105e8632edcd0c74f3ac9636a
                                          • Instruction ID: 36dede232373a6759d71ba38bf33a6c5b052890b4f9db2a8353dd9dc792c57a5
                                          • Opcode Fuzzy Hash: 9855bd9cf542bfb39dab74abd97aad9a108727a105e8632edcd0c74f3ac9636a
                                          • Instruction Fuzzy Hash: C7F0B47B3001057FDF09EB45D942EEA7B7AFBD4359B0180A7E50886214D630D8159B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4b8cf3b0d548e7eef5bced91354ebedd60633cbe1cc20b971b895e761836c47c
                                          • Instruction ID: 688767fe3b107a673a437f0784e6a00845c0ef4de549060bd796e2f1b2af4ec5
                                          • Opcode Fuzzy Hash: 4b8cf3b0d548e7eef5bced91354ebedd60633cbe1cc20b971b895e761836c47c
                                          • Instruction Fuzzy Hash: 27F03AB4E4D148D7DF1CCB9AC5C24F8FF6BAB8E300754E196E00A67606C73099868A51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ad022d86ca6e473b7429372d0d4cdfc82ebcdc13129cbf301a29ea2c4df5e55
                                          • Instruction ID: 2bb478e6b32a45a971996dcc5672438e6cee282995424d3ea5222d1311d94d8d
                                          • Opcode Fuzzy Hash: 8ad022d86ca6e473b7429372d0d4cdfc82ebcdc13129cbf301a29ea2c4df5e55
                                          • Instruction Fuzzy Hash: 4CF01970D04245DFCB48DFA8C895AEEBFF4AF49300F1084AAD401E7211D3709500CBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 888f515e6f6e05751b86a4881a59d4b91c1294c06e6844d3a0d9da8e9c63606c
                                          • Instruction ID: a4f3f2c1b149e0ad9f1b98656539d8b5a5f205be2612cc61618f4122a5c7f3fe
                                          • Opcode Fuzzy Hash: 888f515e6f6e05751b86a4881a59d4b91c1294c06e6844d3a0d9da8e9c63606c
                                          • Instruction Fuzzy Hash: 91012834905214CFCB24DB64D945BA8BBB5FBC8301F0082AED40AA7756DB345D82CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7401cf9755ad4539739e27c6eda2dc02cec18afe9e547100f50379fb43eab790
                                          • Instruction ID: bc0efb58e64a29cebdf82da4d5c9366accacc73578ad8512b70f449ed3982349
                                          • Opcode Fuzzy Hash: 7401cf9755ad4539739e27c6eda2dc02cec18afe9e547100f50379fb43eab790
                                          • Instruction Fuzzy Hash: 39F06D34A09248AFCB15DFA8D94558CBFB1FF89301F1180EAE8459B361D6344A04DB82
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4fe3d427d0148373690477837f24ba63060cd464dbded25f596ed35d41e87e3
                                          • Instruction ID: 8132733c3d90b1d09a191b696adba9760fbf0ee04b0db7bccbe1cff1f1cf987e
                                          • Opcode Fuzzy Hash: d4fe3d427d0148373690477837f24ba63060cd464dbded25f596ed35d41e87e3
                                          • Instruction Fuzzy Hash: 2DF0B7B0D0420A9FDB54DFA9D846AAEBFF4BB48300F5085AA9919E7201E7709A018BD0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb6b055c361fcba60835302ac46918f6aeb0c3e32dbf4b0458000bbdd5ee99b6
                                          • Instruction ID: 7069b26ece47736936fb943751aa91aceb5d1c508b31c671630a48fd65ce1922
                                          • Opcode Fuzzy Hash: bb6b055c361fcba60835302ac46918f6aeb0c3e32dbf4b0458000bbdd5ee99b6
                                          • Instruction Fuzzy Hash: E7011974900255CFCB64DF64D884AADBBB5FF89301F10889AD006E7715CB7099818FA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e0e3a5505dbb7f94ecc89a0b2e55cd17800f2208743804cb3a0887af8b88b9f
                                          • Instruction ID: 3e7f891698f1e332c9917d5bb37e353e4dea09b5ba1ea16b903b7cd0f59c938d
                                          • Opcode Fuzzy Hash: 4e0e3a5505dbb7f94ecc89a0b2e55cd17800f2208743804cb3a0887af8b88b9f
                                          • Instruction Fuzzy Hash: F1F04934904248AFCF26DFA8D45569CBFB1FF89311F1080EEE81597691D6341A54DF42
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd517fbb4b1a1691b219ca9313f1f49621340243e7fc6f679caf616134feb78b
                                          • Instruction ID: 38a9796ad4e683b89d5161b93e1a74453dfa3bd5480e14dcd6b935e4e3c0592c
                                          • Opcode Fuzzy Hash: bd517fbb4b1a1691b219ca9313f1f49621340243e7fc6f679caf616134feb78b
                                          • Instruction Fuzzy Hash: 4EF03034945359CFCB14DF98D9546AC7BBAFB84311F108219D4169B39DDB345945CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 721ba233814d381ff093ba7c031f12c80cd7739076a8d0a844b0dc7ecb715747
                                          • Instruction ID: 71a7c97cb400facf8344fa8297c60a23a058ba0892da4c84fd4b659c0234c8e0
                                          • Opcode Fuzzy Hash: 721ba233814d381ff093ba7c031f12c80cd7739076a8d0a844b0dc7ecb715747
                                          • Instruction Fuzzy Hash: B8E0397080D199CACF48CBA9E8C64BDBF7AFF87345B0415EB841E5A15BD6210500DE91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad6d1c9e8ec877c1ee7e2f2d2d26300453188bec176aa6ce7a080b54fffe49ed
                                          • Instruction ID: f7168c9a108d071705f235bca03555a925e155eb5c98ab205095052f51b9575b
                                          • Opcode Fuzzy Hash: ad6d1c9e8ec877c1ee7e2f2d2d26300453188bec176aa6ce7a080b54fffe49ed
                                          • Instruction Fuzzy Hash: CFF039B4844246DFDB40DF79C58579ABFF0AF48214F2085BAC055EB212E7748606CF81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3aba931ab0dfe1a90b016bbad89ece8757eb769db5037cdbe688dc3ee2ed6a4c
                                          • Instruction ID: 4e4224bdda944e1f38158a72328b681e0a026b6d11be40d18de8711794bea7e3
                                          • Opcode Fuzzy Hash: 3aba931ab0dfe1a90b016bbad89ece8757eb769db5037cdbe688dc3ee2ed6a4c
                                          • Instruction Fuzzy Hash: CFF01574E00208EBCF54EFA8D506A9DBBB5FF88301F10C0AAE81592350EA345A54DF81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b2c89809607ee31d4d8d6af836682edfd154248d09211b90838d6450f1716c0
                                          • Instruction ID: efcdd485d8779a24a76eb0e44b6a2c1d5fad148b54fa32e234bf309301b7a5f8
                                          • Opcode Fuzzy Hash: 3b2c89809607ee31d4d8d6af836682edfd154248d09211b90838d6450f1716c0
                                          • Instruction Fuzzy Hash: 70E0BFB4D4020ADFDB40DF79C54569EBFF1BF08200F1185A6D015E7211E7749A058F91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f8b6daf3a1faa9c2ce93e32820979e20eed6750345770396c4f683641cef2e8
                                          • Instruction ID: f2abc1fd7278daa5d7971358d9186bdd32ad51b58ad132a01e67acbb279f4d55
                                          • Opcode Fuzzy Hash: 3f8b6daf3a1faa9c2ce93e32820979e20eed6750345770396c4f683641cef2e8
                                          • Instruction Fuzzy Hash: B6E09274A09268DFCB08CF99C9908ECBBBABF89301B009099E40997212C73099028F40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c8977a150c0a2302fba29f7f87c8bb090bf53b3dfc3a10f4511ed893fbfed3b
                                          • Instruction ID: 610e8a50b3d8acd1d167da2e04e3915ab4ce370e2e6214fb4d31170e65c16525
                                          • Opcode Fuzzy Hash: 3c8977a150c0a2302fba29f7f87c8bb090bf53b3dfc3a10f4511ed893fbfed3b
                                          • Instruction Fuzzy Hash: CDE04F34909219CFCB28EB98C5515ACBBBEFBC4305B00861984069B719CB344806CBD0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c2e3859845b7565ec76a1b854d60f9cecd5484cf521e6289c7d6cea64c37d68
                                          • Instruction ID: 4a5fe98566d74b2aae774e957a3ecac83cccfebd3cd95baf1f56086dc0f34603
                                          • Opcode Fuzzy Hash: 0c2e3859845b7565ec76a1b854d60f9cecd5484cf521e6289c7d6cea64c37d68
                                          • Instruction Fuzzy Hash: 08E0C23520C2851FCB02DFA1DC60DA23FE87F9620030544E7E1C0CB133D211D524D751
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 243d7a93cda442ded9dd97a7f896fb84649be036bc83d522718f24033f3422d8
                                          • Instruction ID: 496cf908b0a88cab5608db21823e55b9a5d8c6e62b8f1a228ebc0f310cb048d6
                                          • Opcode Fuzzy Hash: 243d7a93cda442ded9dd97a7f896fb84649be036bc83d522718f24033f3422d8
                                          • Instruction Fuzzy Hash: 7CD05E3110D6A9CFDB49CB64E04B5E43F77FB4A11174545DAC04A8BE13C62A8946C710
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e9b5ab79ca6c0211e434d2370f1b18ad357e1d12bf8c250a5a774d0acff6f66
                                          • Instruction ID: 2966f4ce237b959615c01b99bbff9f448131cde9226e952e588a0c2960de9a6e
                                          • Opcode Fuzzy Hash: 1e9b5ab79ca6c0211e434d2370f1b18ad357e1d12bf8c250a5a774d0acff6f66
                                          • Instruction Fuzzy Hash: 5AE0EC3010C210CFCB28DB54E54A6F47B7AFB4E322F10529ED41F66692CB319986CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7788265251ed959c011eccd08c0ab4aaee576879a143d88182de68b7e1516dca
                                          • Instruction ID: e8f7c4d3e65ce4caf8c3013d5803787086b28ef80d2c1f127a7b526caa532c86
                                          • Opcode Fuzzy Hash: 7788265251ed959c011eccd08c0ab4aaee576879a143d88182de68b7e1516dca
                                          • Instruction Fuzzy Hash: 8AD09270108210CFC728DB54E54AAA47B7AFB4A312F01509ED00F57612CB32A985CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 96ca95381cca61de3b08391111f8a3b03bb52d7e37f1420383e5c2b9b05ddcc8
                                          • Instruction ID: ef79480bb285828e5db63f0a5b43f0c6d4caf1fc02f8f10c86de334fd06c3f05
                                          • Opcode Fuzzy Hash: 96ca95381cca61de3b08391111f8a3b03bb52d7e37f1420383e5c2b9b05ddcc8
                                          • Instruction Fuzzy Hash: 18C08C300012058BC63827E8B40E3A97A7CEB80312F1041ACA10B40C124EB04080C7E6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ce47f2aec357d7816f463c698d527c126a7f539084b9d0444a2056b01cd6e479
                                          • Instruction ID: 840787b63b8c4fee4451e7b26d9db1d2bb2c00bb3e1e8e8836d8c8aed1e51ecf
                                          • Opcode Fuzzy Hash: ce47f2aec357d7816f463c698d527c126a7f539084b9d0444a2056b01cd6e479
                                          • Instruction Fuzzy Hash: AFC01230906219CFCF24DF28DA45BACBBBAEB44300F0081E8800E9221AC7341E80CF00
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000011.00000002.1927071184.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_17_2_5490000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: T+-q$[V~*$[V~*$]\`
                                          • API String ID: 0-1849991408
                                          • Opcode ID: 883a375d05ca089f00a44a24e2e6e6e592ae830f7bad3dcfe066d9bd9a4554a8
                                          • Instruction ID: d486a6d619605febe742d00c634503a104df3de805429612f1766c3fe999e1cc
                                          • Opcode Fuzzy Hash: 883a375d05ca089f00a44a24e2e6e6e592ae830f7bad3dcfe066d9bd9a4554a8
                                          • Instruction Fuzzy Hash: F1315075929244CBCF14CF7DC9462FEBFB1FF06314F0485ABA86697282D234A951C762
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:8.4%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:19
                                          Total number of Limit Nodes:4
                                          execution_graph 41770 1460848 41771 146084e 41770->41771 41772 146091b 41771->41772 41774 1461392 41771->41774 41776 146139b 41774->41776 41775 14614b0 41775->41771 41776->41775 41778 1468228 41776->41778 41779 1468232 41778->41779 41780 146824c 41779->41780 41783 6aefa08 41779->41783 41788 6aef9f7 41779->41788 41780->41776 41785 6aefa1d 41783->41785 41784 6aefc32 41784->41780 41785->41784 41786 6aefc48 GlobalMemoryStatusEx GlobalMemoryStatusEx 41785->41786 41787 6aefc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 41785->41787 41786->41785 41787->41785 41790 6aefa08 41788->41790 41789 6aefc32 41789->41780 41790->41789 41791 6aefc48 GlobalMemoryStatusEx GlobalMemoryStatusEx 41790->41791 41792 6aefc58 GlobalMemoryStatusEx GlobalMemoryStatusEx 41790->41792 41791->41790 41792->41790
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: 94ce6b262c3794cd4e2ce05997d4e06f9b7e0716be8d64533af6aaaa7b65d56b
                                          • Instruction ID: 77b0c73a55e52b3b43d86c56431d0dfffc11c61f4fed8eaa130542a4263f3057
                                          • Opcode Fuzzy Hash: 94ce6b262c3794cd4e2ce05997d4e06f9b7e0716be8d64533af6aaaa7b65d56b
                                          • Instruction Fuzzy Hash: C5525030E102098FDF64EB68D6987AEB7B6FB45310F20886AD405EB395DB35DC85CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 409 6ae3468-6ae3489 410 6ae348b-6ae348e 409->410 411 6ae34b4-6ae34b7 410->411 412 6ae3490-6ae34af 410->412 413 6ae34bd-6ae34dc 411->413 414 6ae3c58-6ae3c5a 411->414 412->411 422 6ae34de-6ae34e1 413->422 423 6ae34f5-6ae34ff 413->423 416 6ae3c5c 414->416 417 6ae3c61-6ae3c64 414->417 416->417 417->410 419 6ae3c6a-6ae3c73 417->419 422->423 424 6ae34e3-6ae34f3 422->424 427 6ae3505-6ae3514 423->427 424->427 537 6ae3516 call 6ae3c88 427->537 538 6ae3516 call 6ae3c80 427->538 428 6ae351b-6ae3520 429 6ae352d-6ae380a 428->429 430 6ae3522-6ae3528 428->430 451 6ae3c4a-6ae3c57 429->451 452 6ae3810-6ae38bf 429->452 430->419 461 6ae38e8 452->461 462 6ae38c1-6ae38e6 452->462 464 6ae38f1-6ae3904 461->464 462->464 466 6ae390a-6ae392c call 6ae3054 464->466 467 6ae3c31-6ae3c3d 464->467 466->467 471 6ae3932-6ae393c 466->471 467->452 468 6ae3c43 467->468 468->451 471->467 472 6ae3942-6ae394d 471->472 472->467 473 6ae3953-6ae3a29 472->473 485 6ae3a2b-6ae3a2d 473->485 486 6ae3a37-6ae3a67 473->486 485->486 490 6ae3a69-6ae3a6b 486->490 491 6ae3a75-6ae3a81 486->491 490->491 492 6ae3a83-6ae3a87 491->492 493 6ae3ae1-6ae3ae5 491->493 492->493 496 6ae3a89-6ae3ab3 492->496 494 6ae3aeb-6ae3b27 493->494 495 6ae3c22-6ae3c2b 493->495 507 6ae3b29-6ae3b2b 494->507 508 6ae3b35-6ae3b43 494->508 495->467 495->473 503 6ae3ab5-6ae3ab7 496->503 504 6ae3ac1-6ae3ade call 6ae3060 496->504 503->504 504->493 507->508 511 6ae3b5a-6ae3b65 508->511 512 6ae3b45-6ae3b50 508->512 516 6ae3b7d-6ae3b8e 511->516 517 6ae3b67-6ae3b6d 511->517 512->511 515 6ae3b52 512->515 515->511 521 6ae3ba6-6ae3bb2 516->521 522 6ae3b90-6ae3b96 516->522 518 6ae3b6f 517->518 519 6ae3b71-6ae3b73 517->519 518->516 519->516 526 6ae3bca-6ae3c1b 521->526 527 6ae3bb4-6ae3bba 521->527 523 6ae3b9a-6ae3b9c 522->523 524 6ae3b98 522->524 523->521 524->521 526->495 528 6ae3bbe-6ae3bc0 527->528 529 6ae3bbc 527->529 528->526 529->526 537->428 538->428
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: 5d1f462d37223450694878c53be499dcdef3966949b387c3856ed74384820143
                                          • Instruction ID: 71e21460d5a93a6d17681aa0a6ebad223563ef449b948a4343394dfb49cccc10
                                          • Opcode Fuzzy Hash: 5d1f462d37223450694878c53be499dcdef3966949b387c3856ed74384820143
                                          • Instruction Fuzzy Hash: 9F320030E1065A8FCB15EF75D99459DB7B2FFD9300F20C6A9D409AB264EF30A985CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1440 6ae7d40-6ae7d5e 1441 6ae7d60-6ae7d63 1440->1441 1442 6ae7d7a-6ae7d7d 1441->1442 1443 6ae7d65-6ae7d73 1441->1443 1444 6ae7d7f-6ae7d89 1442->1444 1445 6ae7d8a-6ae7d8d 1442->1445 1451 6ae7de6-6ae7dfc 1443->1451 1452 6ae7d75 1443->1452 1447 6ae7dae-6ae7db1 1445->1447 1448 6ae7d8f-6ae7da9 1445->1448 1449 6ae7dd4-6ae7dd6 1447->1449 1450 6ae7db3-6ae7dcf 1447->1450 1448->1447 1453 6ae7ddd-6ae7de0 1449->1453 1454 6ae7dd8 1449->1454 1450->1449 1459 6ae8017-6ae8021 1451->1459 1460 6ae7e02-6ae7e0b 1451->1460 1452->1442 1453->1441 1453->1451 1454->1453 1462 6ae8022-6ae8057 1460->1462 1463 6ae7e11-6ae7e2e 1460->1463 1466 6ae8059-6ae805c 1462->1466 1470 6ae8004-6ae8011 1463->1470 1471 6ae7e34-6ae7e5c 1463->1471 1468 6ae805e-6ae807a 1466->1468 1469 6ae807f-6ae8082 1466->1469 1468->1469 1472 6ae8088-6ae8097 1469->1472 1473 6ae82b7-6ae82ba 1469->1473 1470->1459 1470->1460 1471->1470 1493 6ae7e62-6ae7e6b 1471->1493 1484 6ae8099-6ae80b4 1472->1484 1485 6ae80b6-6ae80fa 1472->1485 1475 6ae8365-6ae8367 1473->1475 1476 6ae82c0-6ae82cc 1473->1476 1477 6ae836e-6ae8371 1475->1477 1478 6ae8369 1475->1478 1483 6ae82d7-6ae82d9 1476->1483 1477->1466 1481 6ae8377-6ae8380 1477->1481 1478->1477 1487 6ae82db-6ae82e1 1483->1487 1488 6ae82f1-6ae82f5 1483->1488 1484->1485 1497 6ae828b-6ae82a1 1485->1497 1498 6ae8100-6ae8111 1485->1498 1494 6ae82e5-6ae82e7 1487->1494 1495 6ae82e3 1487->1495 1490 6ae82f7-6ae8301 1488->1490 1491 6ae8303 1488->1491 1496 6ae8308-6ae830a 1490->1496 1491->1496 1493->1462 1499 6ae7e71-6ae7e8d 1493->1499 1494->1488 1495->1488 1501 6ae830c-6ae830f 1496->1501 1502 6ae831b-6ae8354 1496->1502 1497->1473 1508 6ae8276-6ae8285 1498->1508 1509 6ae8117-6ae8134 1498->1509 1510 6ae7ff2-6ae7ffe 1499->1510 1511 6ae7e93-6ae7ebd 1499->1511 1501->1481 1502->1472 1522 6ae835a-6ae8364 1502->1522 1508->1497 1508->1498 1509->1508 1519 6ae813a-6ae8230 call 6ae6570 1509->1519 1510->1470 1510->1493 1524 6ae7fe8-6ae7fed 1511->1524 1525 6ae7ec3-6ae7eeb 1511->1525 1573 6ae823e 1519->1573 1574 6ae8232-6ae823c 1519->1574 1524->1510 1525->1524 1531 6ae7ef1-6ae7f1f 1525->1531 1531->1524 1537 6ae7f25-6ae7f2e 1531->1537 1537->1524 1538 6ae7f34-6ae7f66 1537->1538 1546 6ae7f68-6ae7f6c 1538->1546 1547 6ae7f71-6ae7f8d 1538->1547 1546->1524 1548 6ae7f6e 1546->1548 1547->1510 1549 6ae7f8f-6ae7fe6 call 6ae6570 1547->1549 1548->1547 1549->1510 1575 6ae8243-6ae8245 1573->1575 1574->1575 1575->1508 1576 6ae8247-6ae824c 1575->1576 1577 6ae824e-6ae8258 1576->1577 1578 6ae825a 1576->1578 1579 6ae825f-6ae8261 1577->1579 1578->1579 1579->1508 1580 6ae8263-6ae826f 1579->1580 1580->1508
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq
                                          • API String ID: 0-3550614674
                                          • Opcode ID: ce6419568f445054c358c503e4f9fd27d56c69048d274750044bd8c877cb5a76
                                          • Instruction ID: a164b0577b57ab6b39f7419ed0223882b9130b7cfc649443a105fdb09b1b158b
                                          • Opcode Fuzzy Hash: ce6419568f445054c358c503e4f9fd27d56c69048d274750044bd8c877cb5a76
                                          • Instruction Fuzzy Hash: CB02D330B006098FCB54EB69D594A6EB7F2FF84350F148469E415EB3A8DB35EC86CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 77fb7d0cfed577d345bad7893131dcfa8339e390a918628ec23a81015cdd174c
                                          • Instruction ID: b698d27a9b715bbc3c5eb8e9890657d80542f99496e312a793b233aa5b72a924
                                          • Opcode Fuzzy Hash: 77fb7d0cfed577d345bad7893131dcfa8339e390a918628ec23a81015cdd174c
                                          • Instruction Fuzzy Hash: D5626D34F002098FDB54EB68D594AADB7F2EF84354F249869E406EB3A5DB35EC45CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 55e14fdd1ae9656dd811ee41dea17b62208f098a406a2184ca7a3e14583dd437
                                          • Instruction ID: 8f1fd8dc5deb9c9fdc05d72fc52b5f405c1d9d5ab41825f4b19b008b53d30576
                                          • Opcode Fuzzy Hash: 55e14fdd1ae9656dd811ee41dea17b62208f098a406a2184ca7a3e14583dd437
                                          • Instruction Fuzzy Hash: C912E175F102159BDF64EB64E9806AEB7B2FF84318F24842AD8069F395CB35EC41CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 6aeaca0-6aeacbe 1 6aeacc0-6aeacc3 0->1 2 6aeace6-6aeace9 1->2 3 6aeacc5-6aeace1 1->3 4 6aeaceb-6aeacf4 2->4 5 6aead03-6aead06 2->5 3->2 9 6aeacfa-6aeacfe 4->9 10 6aeaed7-6aeaf0e 4->10 6 6aead08-6aead11 5->6 7 6aead16-6aead19 5->7 6->7 11 6aead1f-6aead22 7->11 12 6aeaebd-6aeaec6 7->12 9->5 20 6aeaf10-6aeaf13 10->20 13 6aead3c-6aead3f 11->13 14 6aead24-6aead37 11->14 12->4 15 6aeaecc-6aeaed6 12->15 18 6aead53-6aead56 13->18 19 6aead41-6aead4e 13->19 14->13 24 6aead58-6aead5d 18->24 25 6aead60-6aead63 18->25 19->18 22 6aeaf15-6aeaf19 20->22 23 6aeaf20-6aeaf23 20->23 26 6aeaf1b 22->26 27 6aeaf29-6aeaf64 22->27 23->27 28 6aeb18c-6aeb18f 23->28 24->25 30 6aead74-6aead76 25->30 31 6aead65-6aead69 25->31 26->23 43 6aeaf6a-6aeaf76 27->43 44 6aeb157-6aeb16a 27->44 34 6aeb19e-6aeb1a1 28->34 35 6aeb191 28->35 32 6aead7d-6aead80 30->32 33 6aead78 30->33 31->15 36 6aead6f 31->36 32->1 37 6aead86-6aeadaa 32->37 33->32 39 6aeb1ae-6aeb1b1 34->39 40 6aeb1a3-6aeb1ad 34->40 124 6aeb191 call 6aeb208 35->124 125 6aeb191 call 6aeb1f8 35->125 36->30 58 6aeaeba 37->58 59 6aeadb0-6aeadbf 37->59 41 6aeb1d4-6aeb1d6 39->41 42 6aeb1b3-6aeb1cf 39->42 47 6aeb1dd-6aeb1e0 41->47 48 6aeb1d8 41->48 42->41 55 6aeaf78-6aeaf91 43->55 56 6aeaf96-6aeafda 43->56 49 6aeb16c-6aeb16d 44->49 45 6aeb197-6aeb199 45->34 47->20 51 6aeb1e6-6aeb1f0 47->51 48->47 49->28 55->49 74 6aeafdc-6aeafee 56->74 75 6aeaff6-6aeb035 56->75 58->12 62 6aeadd7-6aeae12 call 6ae6570 59->62 63 6aeadc1-6aeadc7 59->63 84 6aeae2a-6aeae41 62->84 85 6aeae14-6aeae1a 62->85 65 6aeadcb-6aeadcd 63->65 66 6aeadc9 63->66 65->62 66->62 74->75 80 6aeb11c-6aeb131 75->80 81 6aeb03b-6aeb116 call 6ae6570 75->81 80->44 81->80 94 6aeae59-6aeae6a 84->94 95 6aeae43-6aeae49 84->95 86 6aeae1e-6aeae20 85->86 87 6aeae1c 85->87 86->84 87->84 100 6aeae6c-6aeae72 94->100 101 6aeae82-6aeaeb3 94->101 96 6aeae4d-6aeae4f 95->96 97 6aeae4b 95->97 96->94 97->94 103 6aeae76-6aeae78 100->103 104 6aeae74 100->104 101->58 103->101 104->101 124->45 125->45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1078448309
                                          • Opcode ID: 50173d658d5a82a7536de3824d461bc7623ff382398805179a0e9bb212b7ced1
                                          • Instruction ID: 19288c51456fcf965dccd71ec30f478935c45be11c44767b748dbc5d0057134d
                                          • Opcode Fuzzy Hash: 50173d658d5a82a7536de3824d461bc7623ff382398805179a0e9bb212b7ced1
                                          • Instruction Fuzzy Hash: BAE1A130F1020A8FCB65EBA9D5946AEB7F2FF85304F20852AD506AB354DB74DC46CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 539 6ae9110-6ae9135 540 6ae9137-6ae913a 539->540 541 6ae99f8-6ae99fb 540->541 542 6ae9140-6ae9155 540->542 543 6ae99fd-6ae9a1c 541->543 544 6ae9a21-6ae9a23 541->544 549 6ae916d-6ae9183 542->549 550 6ae9157-6ae915d 542->550 543->544 545 6ae9a2a-6ae9a2d 544->545 546 6ae9a25 544->546 545->540 548 6ae9a33-6ae9a3d 545->548 546->545 556 6ae918e-6ae9190 549->556 552 6ae915f 550->552 553 6ae9161-6ae9163 550->553 552->549 553->549 557 6ae91a8-6ae9219 556->557 558 6ae9192-6ae9198 556->558 569 6ae921b-6ae923e 557->569 570 6ae9245-6ae9261 557->570 559 6ae919c-6ae919e 558->559 560 6ae919a 558->560 559->557 560->557 569->570 575 6ae928d-6ae92a8 570->575 576 6ae9263-6ae9286 570->576 581 6ae92aa-6ae92cc 575->581 582 6ae92d3-6ae92ee 575->582 576->575 581->582 587 6ae9313-6ae9321 582->587 588 6ae92f0-6ae930c 582->588 589 6ae9323-6ae932c 587->589 590 6ae9331-6ae93ab 587->590 588->587 589->548 596 6ae93ad-6ae93cb 590->596 597 6ae93f8-6ae940d 590->597 601 6ae93cd-6ae93dc 596->601 602 6ae93e7-6ae93f6 596->602 597->541 601->602 602->596 602->597
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: 6e74939a83908ef1fced0b38150d7486c76d2f10e54cf50045ec900cd4238a5e
                                          • Instruction ID: 3ccda1ceb1be84d09ad535d78fa91efb5341609841ee3bed6a356e256be17a1e
                                          • Opcode Fuzzy Hash: 6e74939a83908ef1fced0b38150d7486c76d2f10e54cf50045ec900cd4238a5e
                                          • Instruction Fuzzy Hash: 42914230F1021A8FDB54EF65D9607AFB7F6AF88240F108569C409EB398EB75DC458B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 605 6aecf18-6aecf33 606 6aecf35-6aecf38 605->606 607 6aecf3a-6aecf7c 606->607 608 6aecf81-6aecf84 606->608 607->608 609 6aecfcd-6aecfd0 608->609 610 6aecf86-6aecfc8 608->610 612 6aed019-6aed01c 609->612 613 6aecfd2-6aed014 609->613 610->609 615 6aed01e-6aed060 612->615 616 6aed065-6aed068 612->616 613->612 615->616 617 6aed06a-6aed06f 616->617 618 6aed072-6aed075 616->618 617->618 622 6aed0be-6aed0c1 618->622 623 6aed077-6aed0b9 618->623 625 6aed10a-6aed10d 622->625 626 6aed0c3-6aed0d2 622->626 623->622 633 6aed404-6aed410 625->633 634 6aed113-6aed116 625->634 629 6aed0d4-6aed0d9 626->629 630 6aed0e1-6aed0ed 626->630 629->630 637 6aed935-6aed96e 630->637 638 6aed0f3-6aed105 630->638 639 6aed266-6aed275 633->639 640 6aed416-6aed703 633->640 641 6aed15f-6aed162 634->641 642 6aed118-6aed15a 634->642 666 6aed970-6aed973 637->666 638->625 644 6aed277-6aed27c 639->644 645 6aed284-6aed290 639->645 818 6aed92a-6aed934 640->818 819 6aed709-6aed70f 640->819 646 6aed164-6aed166 641->646 647 6aed171-6aed174 641->647 642->641 644->645 645->637 657 6aed296-6aed2a8 645->657 652 6aed16c 646->652 653 6aed401 646->653 654 6aed176-6aed192 647->654 655 6aed197-6aed19a 647->655 652->647 653->633 654->655 664 6aed19c-6aed19e 655->664 665 6aed1a9-6aed1ac 655->665 683 6aed2ad-6aed2af 657->683 670 6aed2bf-6aed2c8 664->670 671 6aed1a4 664->671 672 6aed1ae-6aed1f0 665->672 673 6aed1f5-6aed1f8 665->673 676 6aed996-6aed999 666->676 677 6aed975-6aed991 666->677 684 6aed2ca-6aed2cf 670->684 685 6aed2d7-6aed2e3 670->685 671->665 672->673 686 6aed1fa-6aed23c 673->686 687 6aed241-6aed244 673->687 679 6aed99b 676->679 680 6aed9a8-6aed9ab 676->680 677->676 865 6aed99b call 6aeda8d 679->865 866 6aed99b call 6aedaa0 679->866 689 6aed9de-6aed9e0 680->689 690 6aed9ad-6aed9d9 680->690 696 6aed2b6-6aed2b9 683->696 697 6aed2b1 683->697 684->685 699 6aed2e9-6aed2fd 685->699 700 6aed3f4-6aed3f9 685->700 686->687 691 6aed246-6aed25c 687->691 692 6aed261-6aed264 687->692 703 6aed9e7-6aed9ea 689->703 704 6aed9e2 689->704 690->689 691->692 692->639 692->683 696->606 696->670 697->696 699->653 714 6aed303-6aed315 699->714 700->653 702 6aed9a1-6aed9a3 702->680 703->666 708 6aed9ec-6aed9fb 703->708 704->703 723 6aed9fd-6aeda60 call 6ae6570 708->723 724 6aeda62-6aeda77 708->724 725 6aed339-6aed33b 714->725 726 6aed317-6aed31d 714->726 723->724 739 6aeda78 724->739 734 6aed345-6aed351 725->734 730 6aed31f 726->730 731 6aed321-6aed32d 726->731 735 6aed32f-6aed337 730->735 731->735 745 6aed35f 734->745 746 6aed353-6aed35d 734->746 735->734 739->739 748 6aed364-6aed366 745->748 746->748 748->653 750 6aed36c-6aed388 call 6ae6570 748->750 759 6aed38a-6aed38f 750->759 760 6aed397-6aed3a3 750->760 759->760 760->700 762 6aed3a5-6aed3f2 760->762 762->653 820 6aed71e-6aed727 819->820 821 6aed711-6aed716 819->821 820->637 822 6aed72d-6aed740 820->822 821->820 824 6aed91a-6aed924 822->824 825 6aed746-6aed74c 822->825 824->818 824->819 826 6aed74e-6aed753 825->826 827 6aed75b-6aed764 825->827 826->827 827->637 828 6aed76a-6aed78b 827->828 831 6aed78d-6aed792 828->831 832 6aed79a-6aed7a3 828->832 831->832 832->637 833 6aed7a9-6aed7c6 832->833 833->824 836 6aed7cc-6aed7d2 833->836 836->637 837 6aed7d8-6aed7f1 836->837 839 6aed90d-6aed914 837->839 840 6aed7f7-6aed81e 837->840 839->824 839->836 840->637 843 6aed824-6aed82e 840->843 843->637 844 6aed834-6aed84b 843->844 846 6aed84d-6aed858 844->846 847 6aed85a-6aed875 844->847 846->847 847->839 852 6aed87b-6aed894 call 6ae6570 847->852 856 6aed896-6aed89b 852->856 857 6aed8a3-6aed8ac 852->857 856->857 857->637 858 6aed8b2-6aed906 857->858 858->839 865->702 866->702
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq
                                          • API String ID: 0-2086306503
                                          • Opcode ID: 038d43d03047f74d2dc5f12f1bfe477b8b79859f3940bb68d9918aeaa6ddd016
                                          • Instruction ID: f56a0810e354c8ddd6f2b46e72614aa85654ad8f16e890665ae658af9d4731d4
                                          • Opcode Fuzzy Hash: 038d43d03047f74d2dc5f12f1bfe477b8b79859f3940bb68d9918aeaa6ddd016
                                          • Instruction Fuzzy Hash: 7E621030A0020A8FCB55EF68E6A0A5EB7F2FF84304B258569D4159F369DB75ED46CBC0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 867 6ae4b70-6ae4b94 868 6ae4b96-6ae4b99 867->868 869 6ae4b9f-6ae4c97 868->869 870 6ae5278-6ae527b 868->870 890 6ae4c9d-6ae4ce5 869->890 891 6ae4d1a-6ae4d21 869->891 871 6ae529c-6ae529e 870->871 872 6ae527d-6ae5297 870->872 874 6ae52a5-6ae52a8 871->874 875 6ae52a0 871->875 872->871 874->868 877 6ae52ae-6ae52bb 874->877 875->874 913 6ae4cea call 6ae541b 890->913 914 6ae4cea call 6ae5428 890->914 892 6ae4d27-6ae4d97 891->892 893 6ae4da5-6ae4dae 891->893 910 6ae4d99 892->910 911 6ae4da2 892->911 893->877 904 6ae4cf0-6ae4d0c 907 6ae4d0e 904->907 908 6ae4d17-6ae4d18 904->908 907->908 908->891 910->911 911->893 913->904 914->904
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fpq$XPpq$\Opq
                                          • API String ID: 0-2571271785
                                          • Opcode ID: 95c2c7b78ff4c92f6128ed29c94207cda09a576a00bf120d34d87469a437b4c8
                                          • Instruction ID: e8aa0fb6fa918b58aad80bfbda9abf91eba05ba04e307d65460d0cbffbec626e
                                          • Opcode Fuzzy Hash: 95c2c7b78ff4c92f6128ed29c94207cda09a576a00bf120d34d87469a437b4c8
                                          • Instruction Fuzzy Hash: 41615174F002099FEB54ABA9C9547AEBBF6FF88304F208429D506AB395DE754C45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1814 6ae90ff-6ae910c 1816 6ae910e-6ae9124 1814->1816 1817 6ae9126-6ae9135 1814->1817 1816->1817 1818 6ae9137-6ae913a 1817->1818 1819 6ae99f8-6ae99fb 1818->1819 1820 6ae9140-6ae9155 1818->1820 1821 6ae99fd-6ae9a1c 1819->1821 1822 6ae9a21-6ae9a23 1819->1822 1827 6ae916d-6ae9183 1820->1827 1828 6ae9157-6ae915d 1820->1828 1821->1822 1823 6ae9a2a-6ae9a2d 1822->1823 1824 6ae9a25 1822->1824 1823->1818 1826 6ae9a33-6ae9a3d 1823->1826 1824->1823 1834 6ae918e-6ae9190 1827->1834 1830 6ae915f 1828->1830 1831 6ae9161-6ae9163 1828->1831 1830->1827 1831->1827 1835 6ae91a8-6ae9219 1834->1835 1836 6ae9192-6ae9198 1834->1836 1847 6ae921b-6ae923e 1835->1847 1848 6ae9245-6ae9261 1835->1848 1837 6ae919c-6ae919e 1836->1837 1838 6ae919a 1836->1838 1837->1835 1838->1835 1847->1848 1853 6ae928d-6ae92a8 1848->1853 1854 6ae9263-6ae9286 1848->1854 1859 6ae92aa-6ae92cc 1853->1859 1860 6ae92d3-6ae92ee 1853->1860 1854->1853 1859->1860 1865 6ae9313-6ae9321 1860->1865 1866 6ae92f0-6ae930c 1860->1866 1867 6ae9323-6ae932c 1865->1867 1868 6ae9331-6ae93ab 1865->1868 1866->1865 1867->1826 1874 6ae93ad-6ae93cb 1868->1874 1875 6ae93f8-6ae940d 1868->1875 1879 6ae93cd-6ae93dc 1874->1879 1880 6ae93e7-6ae93f6 1874->1880 1875->1819 1879->1880 1880->1874 1880->1875
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq
                                          • API String ID: 0-3550614674
                                          • Opcode ID: 81684efd53c9b7fb62a1fe94fd6f3cc78f52c69f2053c6a712489faeeb6da741
                                          • Instruction ID: af0b0d6341bcd03add9faa174c285409d8e3c1fd9bd0add7cf2d82239a09e17f
                                          • Opcode Fuzzy Hash: 81684efd53c9b7fb62a1fe94fd6f3cc78f52c69f2053c6a712489faeeb6da741
                                          • Instruction Fuzzy Hash: 0E515030F1020A8FDB54EFB5D960BAF77F6AB88690F508469C409DB398EB75DC418B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1919 146efb7-146f044 GlobalMemoryStatusEx 1922 146f046-146f04c 1919->1922 1923 146f04d-146f075 1919->1923 1922->1923
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0146F037
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1983082242.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_1460000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 5c2317261de711fda87538f0f7a0e177a753b2e44981237e5eaa371de920ce3a
                                          • Instruction ID: f01a209caf9e81e035b327b4456300c3c58636c91a1f0dfd88d961c75aed2de9
                                          • Opcode Fuzzy Hash: 5c2317261de711fda87538f0f7a0e177a753b2e44981237e5eaa371de920ce3a
                                          • Instruction Fuzzy Hash: 382142B2C00269CFCB10CFAAD5447DEFBF4AF08220F14856AD418B7255C378A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1926 146efd0-146f044 GlobalMemoryStatusEx 1928 146f046-146f04c 1926->1928 1929 146f04d-146f075 1926->1929 1928->1929
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0146F037
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1983082242.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_1460000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: bbbdb4cc9d6763ca9dc700795f72c251dc6871e9ddffa95d8e79e3b8725c2fb8
                                          • Instruction ID: 5aec018a058771064296a728d92aa19c731d4c40e80490ad3f29278263383fc0
                                          • Opcode Fuzzy Hash: bbbdb4cc9d6763ca9dc700795f72c251dc6871e9ddffa95d8e79e3b8725c2fb8
                                          • Instruction Fuzzy Hash: 7B1123B2C00269DBCB10DF9AD444BDEFBF4AF48324F10812AD818B7255D378A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1992 6ae4b61-6ae4b94 1994 6ae4b96-6ae4b99 1992->1994 1995 6ae4b9f-6ae4c97 1994->1995 1996 6ae5278-6ae527b 1994->1996 2016 6ae4c9d-6ae4ce5 1995->2016 2017 6ae4d1a-6ae4d21 1995->2017 1997 6ae529c-6ae529e 1996->1997 1998 6ae527d-6ae5297 1996->1998 2000 6ae52a5-6ae52a8 1997->2000 2001 6ae52a0 1997->2001 1998->1997 2000->1994 2003 6ae52ae-6ae52bb 2000->2003 2001->2000 2039 6ae4cea call 6ae541b 2016->2039 2040 6ae4cea call 6ae5428 2016->2040 2018 6ae4d27-6ae4d97 2017->2018 2019 6ae4da5-6ae4dae 2017->2019 2036 6ae4d99 2018->2036 2037 6ae4da2 2018->2037 2019->2003 2030 6ae4cf0-6ae4d0c 2033 6ae4d0e 2030->2033 2034 6ae4d17-6ae4d18 2030->2034 2033->2034 2034->2017 2036->2037 2037->2019 2039->2030 2040->2030
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPpq
                                          • API String ID: 0-1266478781
                                          • Opcode ID: dbe6a4e9a4ca4690268de4d08e1fe0b5221174f56dbc610c06804a53441693ed
                                          • Instruction ID: 6dbeef2088eddb518d2250714458c5f62013702def99b4f6bab1192f7f16f4f1
                                          • Opcode Fuzzy Hash: dbe6a4e9a4ca4690268de4d08e1fe0b5221174f56dbc610c06804a53441693ed
                                          • Instruction Fuzzy Hash: D0415374F002099FDB54AFA5C954BAEBBF6FF88300F208529D505AB3A5DE719C45CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2041 6aedaa0-6aedab7 2042 6aedab9-6aedabc 2041->2042 2043 6aedabe 2042->2043 2044 6aedacb-6aedace 2042->2044 2049 6aedac4-6aedac6 2043->2049 2045 6aedad0-6aedaec 2044->2045 2046 6aedaf1-6aedaf4 2044->2046 2045->2046 2047 6aedaf6-6aedb22 2046->2047 2048 6aedb27-6aedb29 2046->2048 2047->2048 2050 6aedb2b 2048->2050 2051 6aedb30-6aedb33 2048->2051 2049->2044 2050->2051 2051->2042 2053 6aedb35-6aedb44 2051->2053 2056 6aedb4a-6aedb83 2053->2056 2057 6aedcc9-6aedcf3 2053->2057 2064 6aedb85-6aedb8f 2056->2064 2065 6aedbd1-6aedbf5 2056->2065 2060 6aedcf4 2057->2060 2060->2060 2069 6aedba7-6aedbcf 2064->2069 2070 6aedb91-6aedb97 2064->2070 2071 6aedbff-6aedcc3 2065->2071 2072 6aedbf7 2065->2072 2069->2064 2069->2065 2073 6aedb9b-6aedb9d 2070->2073 2074 6aedb99 2070->2074 2071->2056 2071->2057 2072->2071 2073->2069 2074->2069
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: db85ff75e3895da3674b05e3f2a4522fc26f1f096eaec0299ed89dac4ce11b78
                                          • Instruction ID: 6f8a32bdfbded31d594138fb56d3e77fea2f1726715c5bd6fe6b362776c9e33f
                                          • Opcode Fuzzy Hash: db85ff75e3895da3674b05e3f2a4522fc26f1f096eaec0299ed89dac4ce11b78
                                          • Instruction Fuzzy Hash: 5241AF30E0020A9FDB64FFA5D59069EBBF6BF85340F204529E402EB254EB75E846CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: 98dae029c4798526ed5ea2cd143d75be0a8826d052c7fcc232bcabcd5b2468f3
                                          • Instruction ID: 69b2cf70d9f8089588f02da1b2f4d38736898d907b0dbf1199db02965107f91d
                                          • Opcode Fuzzy Hash: 98dae029c4798526ed5ea2cd143d75be0a8826d052c7fcc232bcabcd5b2468f3
                                          • Instruction Fuzzy Hash: 58419130E102099FDB64BF75D59069EBBB6FF85340F108529E801EB254EB75D846CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: 32fd3003a44b8dd16ee417f8add930e436f731e9a6fa9f9e6f1ca89beece6652
                                          • Instruction ID: c009dc57b3d61d22f7c3994097b1b89d8973f2ba8772a9ed38e8bab8088997e1
                                          • Opcode Fuzzy Hash: 32fd3003a44b8dd16ee417f8add930e436f731e9a6fa9f9e6f1ca89beece6652
                                          • Instruction Fuzzy Hash: 51310170B002028FDB65AB74D65476E7BEAEB89340F24446CD402DB399DF39DD46CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHkq
                                          • API String ID: 0-902561536
                                          • Opcode ID: 12996925ea4e4ec8a7b3f2c0c3ce742004681e09175369edb4a82e553cbe0847
                                          • Instruction ID: 07f8bb63168784f5132a97cb4c9655cbb9d4f3d3aff3969e56b55ff2aa1a2e9e
                                          • Opcode Fuzzy Hash: 12996925ea4e4ec8a7b3f2c0c3ce742004681e09175369edb4a82e553cbe0847
                                          • Instruction Fuzzy Hash: 4531E270B002068FDB65AB78D65476E7BEBBB89340F208468D406DB399DF35DD41CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq
                                          • API String ID: 0-3037731980
                                          • Opcode ID: 8742d49fc95cebc0c7c28003ca36f05eff03d0b933f08e32b4f3f2655b2e0244
                                          • Instruction ID: 236a67f4432b6fcbe19c6406320a36e1faf8c72d12a8478bd6c816916524fab2
                                          • Opcode Fuzzy Hash: 8742d49fc95cebc0c7c28003ca36f05eff03d0b933f08e32b4f3f2655b2e0244
                                          • Instruction Fuzzy Hash: C4F0A936A00206CFEFA4AA94EEA16A9F375AB60290F2000B2D901AB154C239DA01CA50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: \Opq
                                          • API String ID: 0-3546586535
                                          • Opcode ID: 74bad28dc0b062f619c402a12c8f3de14ab8922a247c9418e5c8eccf12c5f181
                                          • Instruction ID: a8b78426cde0cb9980eb4b28f82e064c2fd152eebc7f312e6dec413eaf0f5c75
                                          • Opcode Fuzzy Hash: 74bad28dc0b062f619c402a12c8f3de14ab8922a247c9418e5c8eccf12c5f181
                                          • Instruction Fuzzy Hash: 36F05E30A5422ADFDF14EF90E859BADBBF6FF48710F24012AE402A7294CB701C45CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1c936036304cbb5d870de6a54266bcd5c295b61020085ed056abb77f4d3fb0b
                                          • Instruction ID: e757280fb3a045fbcc03a5e9a665c2778bd63d939d0a99577d4c1c85ad679538
                                          • Opcode Fuzzy Hash: d1c936036304cbb5d870de6a54266bcd5c295b61020085ed056abb77f4d3fb0b
                                          • Instruction Fuzzy Hash: EF328334B102098FDF54EB68D594BAEB7B2FB88360F108529E416EB359DB35EC45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 13f7b0c9ee5fe6ea62f45c2afc2aa90c60e6bd9037d603f576ee9410013ad8b7
                                          • Instruction ID: 51a25c3885921dbe584651e3c79a5eed993bcb9bfdf77ba65e34f9bb262560ad
                                          • Opcode Fuzzy Hash: 13f7b0c9ee5fe6ea62f45c2afc2aa90c60e6bd9037d603f576ee9410013ad8b7
                                          • Instruction Fuzzy Hash: 9AA17770F101098FEF64EBACD6987AEB6B6FB49310F204829D406EB795DA35DC818771
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5dae89c9738ea072f50d165699ffa7d75222de6b2f0226ecb2b0b3913fbe3c5d
                                          • Instruction ID: 51b0d860eabbe67425951c63424322a2eb39f070f2bc9d578d0700cc2935675f
                                          • Opcode Fuzzy Hash: 5dae89c9738ea072f50d165699ffa7d75222de6b2f0226ecb2b0b3913fbe3c5d
                                          • Instruction Fuzzy Hash: 8E61E4B1F001124FCF51AB7DC88066EBAEBAFE4610B154479E80ADB379DE65DC0287D1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d54f668ad3be991d90df2e09aa630bcde5d39055a07d9c7dc114f6f27a99021e
                                          • Instruction ID: f4b69f6db441d22d414c52f806cb23b7c80982f8ef4d0311bb2d5b36250c1e8b
                                          • Opcode Fuzzy Hash: d54f668ad3be991d90df2e09aa630bcde5d39055a07d9c7dc114f6f27a99021e
                                          • Instruction Fuzzy Hash: CE812C30B1060A8BDF54EFA9D55466EB7F6EB89300F108469D40AEB399EA34DC468B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9f3cd43c759ef7dff038aa038f6486bc9a583e1623af339672fd8305c3bb691c
                                          • Instruction ID: 6cd1d89917d0220e3311b79e5cf14a7e8bf1a404884e14999fb10d0541c42d83
                                          • Opcode Fuzzy Hash: 9f3cd43c759ef7dff038aa038f6486bc9a583e1623af339672fd8305c3bb691c
                                          • Instruction Fuzzy Hash: 82811C30B0060A8BDF54EFA9D55466EB7F6EF89340F108469E40AEB399EB34DC468B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c852848eb13772c3cad93c7966f44b165fa58a2e78e19743132d7967a5bac9f6
                                          • Instruction ID: 08edde48aed2fcb8f152356e74143a270aa948cac7c9d00b1687bf9720ee74af
                                          • Opcode Fuzzy Hash: c852848eb13772c3cad93c7966f44b165fa58a2e78e19743132d7967a5bac9f6
                                          • Instruction Fuzzy Hash: DD915C34E1061A8FDF60DF68C880B9DB7B5FF89304F208699D549BB295DB70A985CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a1b087c1216b7600e09df4cfe2a8a0077f909ee8a04085555097377bd0641416
                                          • Instruction ID: 458550c345a2985f854344419e1f895f319f0fc691f29c758a7fe7377a493bd7
                                          • Opcode Fuzzy Hash: a1b087c1216b7600e09df4cfe2a8a0077f909ee8a04085555097377bd0641416
                                          • Instruction Fuzzy Hash: CC912C34E1061A8BDF60DF68C880B9DB7B5FF89304F208699D549BB355DB70A985CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bbbc8d4b3b0ec447be612d4007e2e6766e801b61697516751feed50a5d5dca6d
                                          • Instruction ID: 18a4af9bc2d9be81cd0880ae5d930623fe682258a89e692a514b7b41b56eabce
                                          • Opcode Fuzzy Hash: bbbc8d4b3b0ec447be612d4007e2e6766e801b61697516751feed50a5d5dca6d
                                          • Instruction Fuzzy Hash: 5F713D70E002099FCB54EBA9D990AAEB7F6FF84304F258529D505EB369DB30EC46CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c58a6f32be053dd21f5745ac6bb264efce2e54b11fe46887d27217747ad21b44
                                          • Instruction ID: a7f672e44d31f72986660092ec8c599c7c387d5622634875bd423db91f880e82
                                          • Opcode Fuzzy Hash: c58a6f32be053dd21f5745ac6bb264efce2e54b11fe46887d27217747ad21b44
                                          • Instruction Fuzzy Hash: 7E712C70A002099FCB54EFA9D990A9EBBF6FF88304F158529D105EB369DB30EC45CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d66c3edf9e77595e6bcf49722f4ac8cf9ab5359c5b71e56f02b9cde6db18c88
                                          • Instruction ID: 0280ffba4d39d89321200fcc7fa4f938d7354b84898a5a638a2733f390a2d544
                                          • Opcode Fuzzy Hash: 9d66c3edf9e77595e6bcf49722f4ac8cf9ab5359c5b71e56f02b9cde6db18c88
                                          • Instruction Fuzzy Hash: 5C51D131F00109DFDB64BF78E4946ADBBB2FB89315F20886AE106DB264DB359855CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cde4e2a38266a49684353a8253cc7b229fe562fd93a7f5cd01d5374daba4e653
                                          • Instruction ID: 9e60e475c3d1f862d45e9e5c8afc168e41f7ce4f04704128aac7a5bae6c6e80d
                                          • Opcode Fuzzy Hash: cde4e2a38266a49684353a8253cc7b229fe562fd93a7f5cd01d5374daba4e653
                                          • Instruction Fuzzy Hash: 6C51D830F202058FEF64776CE97476F365ED789310F20082AE50ADB3A9CA69CC8547E2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ebfa36d0673643de37ef37a12483f0a4fe183f36bcfaa3f27322f0f88830fd5
                                          • Instruction ID: 514e0c916efe8748e91c96ad727e04408b4393c8603045591a077cc70b922d20
                                          • Opcode Fuzzy Hash: 5ebfa36d0673643de37ef37a12483f0a4fe183f36bcfaa3f27322f0f88830fd5
                                          • Instruction Fuzzy Hash: 7951EC30F202058FEF64776CD97476F365ED789710F20482AE40ADB3A9CA69CC8547E2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9aceb2a5512154b07af6d3f87c67aa55682e5e65ecaff69f567b62337d5db01f
                                          • Instruction ID: c3fc648faf9bffed873bf7f36a898710253b9fe9f5a9853ca10d70f741230b34
                                          • Opcode Fuzzy Hash: 9aceb2a5512154b07af6d3f87c67aa55682e5e65ecaff69f567b62337d5db01f
                                          • Instruction Fuzzy Hash: 0A518F74E1011A9BDF64AB68D480B7EFBB2FB44318F288926E515DF281C735E891CBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 304089be4d9a4780b54dd90e3e685378150a724ca6a194e18a5a782a2b36f272
                                          • Instruction ID: d6379bf98bd13db818512774943e29531ff5458eb24dbfd75ee507e8f57bf3c8
                                          • Opcode Fuzzy Hash: 304089be4d9a4780b54dd90e3e685378150a724ca6a194e18a5a782a2b36f272
                                          • Instruction Fuzzy Hash: B7412D71E006098FDF70DF99E880AAFF7F2EB84314F10492AD116DB654D731E9558B91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ce91b155c2134de27d499d35cbb4fc8b54eb0fd04914681e5db5ae0726ad35d
                                          • Instruction ID: 307f43070d924b6d37fce713b049b1ed228d15471dccd21c6372aa90348caf8d
                                          • Opcode Fuzzy Hash: 8ce91b155c2134de27d499d35cbb4fc8b54eb0fd04914681e5db5ae0726ad35d
                                          • Instruction Fuzzy Hash: 12318470E1020A9FCF24EF69D990A9EBBF5FF85300F144529E405AB754EB70E946CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cee31434a060f72fe687dfb62882b8af62e3e3eede242cdad4e2c28a47e21257
                                          • Instruction ID: 00f22f14f3126c6cfc11a6442963026ea16a7bd0c4d84216f29002bb4053e3a5
                                          • Opcode Fuzzy Hash: cee31434a060f72fe687dfb62882b8af62e3e3eede242cdad4e2c28a47e21257
                                          • Instruction Fuzzy Hash: 5531A334E1020A9BCB05DFA4D9957AEBBB6FF89300F108929E806EB354DB75DD46CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ec614dc3685e54ab751df719ca07260d7622e581f0812ebfcd38c978330ca136
                                          • Instruction ID: d59e9d0fc130910bffd19728efd2d1413d75d2b6dba4ccd1afbe1b1e2a09efbc
                                          • Opcode Fuzzy Hash: ec614dc3685e54ab751df719ca07260d7622e581f0812ebfcd38c978330ca136
                                          • Instruction Fuzzy Hash: DA318230E102099BCB14DFA4D854BAEBBF6BF89700F108929E806EB354DB71ED45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1982634392.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_140d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: edf66a573f671c67b0559a9ffd435826e5b58db0c303183dd6194b00c642cc63
                                          • Instruction ID: 46f3c8b11623330446dfbfa79761bc215a2ae73d7c5acdbd95994d556d8d3c47
                                          • Opcode Fuzzy Hash: edf66a573f671c67b0559a9ffd435826e5b58db0c303183dd6194b00c642cc63
                                          • Instruction Fuzzy Hash: 4F312B7150D3C09FC703CB64D994611BF71AB47214F29C5EBD8898F2A3C27A980ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f03999d0368790ac858cf19b79fb802e979c4ef12147f13d4c89d675aa7320f
                                          • Instruction ID: ac324c0d23a79845787e80a5b03257f220fc21d5cdabe95d725265ff82e5f52c
                                          • Opcode Fuzzy Hash: 4f03999d0368790ac858cf19b79fb802e979c4ef12147f13d4c89d675aa7320f
                                          • Instruction Fuzzy Hash: 51216975F116199FDF40EFA9E981AAEB7F1AF48650F10802AE905EB354EB34D8408B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 97ba27e2a126743cada526e3b56bf43b793e12bda3d22e493730fda702117592
                                          • Instruction ID: 1c3bdc74ae18a108250c731daa48dd47b84d0cd7caec2c64bb2b5b288ad51ac2
                                          • Opcode Fuzzy Hash: 97ba27e2a126743cada526e3b56bf43b793e12bda3d22e493730fda702117592
                                          • Instruction Fuzzy Hash: EE217C75F112099FDF40DF79D951AAEBBF1AF48650F148029E905EB354EB34D801CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1982634392.000000000140D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0140D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_140d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 71c85c5a46034dc6a446e03c2e4080f842dd304985c2fc289eff2c2df931dfc7
                                          • Instruction ID: f8e971da43b59074b0e652e9b3f58e505e3ca42c7d67299882108cdbec1612a9
                                          • Opcode Fuzzy Hash: 71c85c5a46034dc6a446e03c2e4080f842dd304985c2fc289eff2c2df931dfc7
                                          • Instruction Fuzzy Hash: C82103B1904204DFCB16DF99C984B26BB65EB84318F20C57AE94D4B3A6C736D44BCA61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 99e392d70f03dd54aaf1d9ca0087919bc7a0971bfbba68b3c12b21bf59399342
                                          • Instruction ID: 9c791538759e5e354db7ee2f9906e93e18f7c19740bce4a35174c27627638ac3
                                          • Opcode Fuzzy Hash: 99e392d70f03dd54aaf1d9ca0087919bc7a0971bfbba68b3c12b21bf59399342
                                          • Instruction Fuzzy Hash: 5B11E335F100154BDBA0FBADD89576EB7E6EB84724F148435F20AEB3A4EA26DC458780
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d02dd01f6679bc52ffb8656adae355aabee9d17df1325dac0dc48b4604cfd90a
                                          • Instruction ID: de557833dcbf068a88e72dabd99004cb77733061862ab5e434cd59ec20726b63
                                          • Opcode Fuzzy Hash: d02dd01f6679bc52ffb8656adae355aabee9d17df1325dac0dc48b4604cfd90a
                                          • Instruction Fuzzy Hash: 9A11BE71E002299FCF54EB68D9906EEB7F1FB89310F1484AAD10AEB354DA31D985CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 39c5a8a8cc178edae35713db96e8b914bb7475f6830f2398aa459323bb0900f4
                                          • Instruction ID: 5f251ce507d1358d61cbabe67691aee8344f92b48e6528562043c2e2318e4583
                                          • Opcode Fuzzy Hash: 39c5a8a8cc178edae35713db96e8b914bb7475f6830f2398aa459323bb0900f4
                                          • Instruction Fuzzy Hash: F711A131B104284FDF54AB69C914ABE77FAEBC8650B00453AD406EB358EE79DC028BD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4a2ed50560c6c9e7a33e514601df9664710a8f6e6b8cc028e0def65a2e6810be
                                          • Instruction ID: 6897ce4962222d87cb092e42620b566ab3e71de6e11fc266ae616d7c0881fc5c
                                          • Opcode Fuzzy Hash: 4a2ed50560c6c9e7a33e514601df9664710a8f6e6b8cc028e0def65a2e6810be
                                          • Instruction Fuzzy Hash: 7701F735B004110BDB64A6BDD450B2BB7DBEBD9B20F10887AE50ADB385EE21DC034390
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efedd94473ca5766c2b6369ca33d235063db10862caeb870edc94f66b3e4e23d
                                          • Instruction ID: 073262ac37c19627c4404415cc628c2a9536494ba40ca915917c28d720f15ffa
                                          • Opcode Fuzzy Hash: efedd94473ca5766c2b6369ca33d235063db10862caeb870edc94f66b3e4e23d
                                          • Instruction Fuzzy Hash: 56118C72E007058FCB60DFA9EDC1AAFFBB2FF84304F14892AD11697654D731A8558B90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 207065bdad87359546fc7cde24426ec9829ec803a96002aedbd4b94119be3555
                                          • Instruction ID: 61d46f2fd84c558a66b904e548fedb19a620160d223cf227afe82b5cf03df3d8
                                          • Opcode Fuzzy Hash: 207065bdad87359546fc7cde24426ec9829ec803a96002aedbd4b94119be3555
                                          • Instruction Fuzzy Hash: 4001D472B001150FCB11A6BC996476A6BE2DB89660F14882BE20ADB344EE25CC478390
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d6300b3c4f5adb3755552c9d069e2128cb857932be5dd2f2c4a6a7e137c7444f
                                          • Instruction ID: 8a283b015b515e92987aa4ed8e7def64d3128f0a9adb6f542b8e559f9941c47e
                                          • Opcode Fuzzy Hash: d6300b3c4f5adb3755552c9d069e2128cb857932be5dd2f2c4a6a7e137c7444f
                                          • Instruction Fuzzy Hash: 2221CEB5D01259AFCB00DF9AD884ADEFBB4FB48324F10852AE918B7241C374A954CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 573445da9565001719c49a02ca4da2738c90a6f397850c336de1680591ada602
                                          • Instruction ID: 692b21b93614d1d66fe9048f9d6b888edb0f9256a0b92abc9aeddf37ea3d44cc
                                          • Opcode Fuzzy Hash: 573445da9565001719c49a02ca4da2738c90a6f397850c336de1680591ada602
                                          • Instruction Fuzzy Hash: 9811AFB5D01259AFCB00DF9AD884ADEFBB5FB48324F10852AE918A7240C374A954CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1090560e6e00c69bcfb35cb2d8c8cf54b05bacf82c9bfabf6223b169e86e497
                                          • Instruction ID: 70907516a22cdc09f2b785ad039762396ddc12732f2f275fbd7ab64c7daf0ffb
                                          • Opcode Fuzzy Hash: e1090560e6e00c69bcfb35cb2d8c8cf54b05bacf82c9bfabf6223b169e86e497
                                          • Instruction Fuzzy Hash: 00018135B104110BDB64A6BD9454B2BB7DFDBD9B20F10887AE50ACB354EE62DC064395
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c94aa07d125db30aa6881f3864cbe104c1efb0ebc0f75dd4e806f1a824b70c7
                                          • Instruction ID: 8af7154eec0a6d119312aaf460b2ad08e545147ee5e6ae6a75220745ca30a3bb
                                          • Opcode Fuzzy Hash: 6c94aa07d125db30aa6881f3864cbe104c1efb0ebc0f75dd4e806f1a824b70c7
                                          • Instruction Fuzzy Hash: DE01D436F100254BDF94AAA8DD157EE73FAAF88250F044136D406E7348EF65CC1287D1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad7a79526c803e1e6ca10ca3a2853639ba90b2a4014f40fa55784345ec168219
                                          • Instruction ID: 4a0d5e1e9a45dca8e1b55326e830054b977dfedd52d6853c30d65392e34b99d4
                                          • Opcode Fuzzy Hash: ad7a79526c803e1e6ca10ca3a2853639ba90b2a4014f40fa55784345ec168219
                                          • Instruction Fuzzy Hash: 5701A471B104150FDB64A67CD960B3F67D6DBC9660F10883AE20ACB344EE51DC068391
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d854cb9d5ee61709654c1cdecde9b376de6373f9199ab963a6b1931e6c2cfe6f
                                          • Instruction ID: 1a914ad4961241f74be6920d19d3df88a5e49c2b3e7b71015bd9a65d7c52fac0
                                          • Opcode Fuzzy Hash: d854cb9d5ee61709654c1cdecde9b376de6373f9199ab963a6b1931e6c2cfe6f
                                          • Instruction Fuzzy Hash: 42018134B100154BDB61FB7CD465B2EB7D6EB89760F108829E60ADB354EE22EC468785
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8af458a690c939c36ea7cace3755f3ac4627eda6f3fdbb47380b85f8e24b4384
                                          • Instruction ID: 49be67d2d5e9a87ae95fa30db9a30a9e6bc93bcdb80c520f40bc9ffc7a648d72
                                          • Opcode Fuzzy Hash: 8af458a690c939c36ea7cace3755f3ac4627eda6f3fdbb47380b85f8e24b4384
                                          • Instruction Fuzzy Hash: 94F0F635F201155BCF64AA79A8546EEB766EBC4264F22087BED05EB340EA355C0783C1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 822098d9cd42fe5272d749380cc9627b06a9d4eaaad34cd7fbf5f7efb85f7ba9
                                          • Instruction ID: 8596ab6de2e5c056353884bdb442d0aa606558755e36f445340e56b160f4cf98
                                          • Opcode Fuzzy Hash: 822098d9cd42fe5272d749380cc9627b06a9d4eaaad34cd7fbf5f7efb85f7ba9
                                          • Instruction Fuzzy Hash: 3CF0E93AF20268DBDB14AA78EC506EA7376EB84364F104426E951F7244DB315D41CBC0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 769214e84b032e21e43026525e562a6d1e6de10d789225fe9ae9be95a5067c47
                                          • Instruction ID: 933bb2631632689e51c65aa2ce7021f012f610751c106a8e2821c004974d788e
                                          • Opcode Fuzzy Hash: 769214e84b032e21e43026525e562a6d1e6de10d789225fe9ae9be95a5067c47
                                          • Instruction Fuzzy Hash: 30F0A736E202689BDB14AA65E8105DAB37AE784364F104429E911E7344DB71680087C0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d94d7882b67d17ea119d57b4c09acfd8427fabcbb60e8252ad6552572f8182a
                                          • Instruction ID: bc727d6d6e7303a99a240f6696fe1434b2f5d3306d0425c1296d9ffb327fddcf
                                          • Opcode Fuzzy Hash: 5d94d7882b67d17ea119d57b4c09acfd8427fabcbb60e8252ad6552572f8182a
                                          • Instruction Fuzzy Hash: 57E0D870E10108BBDF50EFB0CA5575EB7B8EB11204F1188E6D858DF502E532D9114781
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 60989437eb31f36a88b24c626a9401e03f262ae62647aa4789d74cd00d0c7935
                                          • Instruction ID: f0f302feaa5ee191fe4b51e5c92d39b1628e8964625973fcc1af377158d3ebce
                                          • Opcode Fuzzy Hash: 60989437eb31f36a88b24c626a9401e03f262ae62647aa4789d74cd00d0c7935
                                          • Instruction Fuzzy Hash: AAE01271E10108BBDF50EFB4CB5575E77ADD711214F2089A6D409DF201E577DA014780
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1324371161
                                          • Opcode ID: 81bd0bd08a2199a4358b54b54b23321e6ab259d19f49b3b6c097bf8f4d516e7b
                                          • Instruction ID: 33c9c8704e387fd2f4eda5d2acc9b99cae3fd167fe6ae91e980519352c3ffb65
                                          • Opcode Fuzzy Hash: 81bd0bd08a2199a4358b54b54b23321e6ab259d19f49b3b6c097bf8f4d516e7b
                                          • Instruction Fuzzy Hash: FB120B30E002198FDB64EF69C954A9EB7B6BF88304F208569D509AB364DB35ED85CF80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1078448309
                                          • Opcode ID: b97c0bc676833eec374aa832f24220c575e537eb845cb25a2ad82384ad1d0f65
                                          • Instruction ID: 4925aa21ee541e5bb66010e4ff90bb38819efcaeed6af310076c74cd2e9c07b9
                                          • Opcode Fuzzy Hash: b97c0bc676833eec374aa832f24220c575e537eb845cb25a2ad82384ad1d0f65
                                          • Instruction Fuzzy Hash: C0916E30E502099FDB64FFA5D69476EBBF6BF84304F208429E5029B394DB79AC45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                          • API String ID: 0-1342094364
                                          • Opcode ID: b234fd6379a75976bb3a3329c1e5d903f65e1165b2ff1101fde857d467ffe6cd
                                          • Instruction ID: bfea463720b322bf763387d30f360a1906a1db8bfd37caad2db16ad39d0bb4ac
                                          • Opcode Fuzzy Hash: b234fd6379a75976bb3a3329c1e5d903f65e1165b2ff1101fde857d467ffe6cd
                                          • Instruction Fuzzy Hash: E5F16E30B00209CFDB54EFA9D554A6EB7B6BF94344F208569D4069B3A8DB35EC82CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: b35bdc3660559b3f44dcb19f606c9a8ba01fe7d2edc4787ad1e279ae0d6229e5
                                          • Instruction ID: be21e37c7c01b72c48186c92211bf886569f31289d194dc29bb3403dfec4d92c
                                          • Opcode Fuzzy Hash: b35bdc3660559b3f44dcb19f606c9a8ba01fe7d2edc4787ad1e279ae0d6229e5
                                          • Instruction Fuzzy Hash: 39B14D30F102098FDB64EF69D55469EB7B6FF84304F248429D006AB3A8DB79DC82CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LRkq$LRkq$$kq$$kq
                                          • API String ID: 0-2392252538
                                          • Opcode ID: 63cf341b71d1c7d208f98eba3b91d84992296a21f234aa84f18c080debebba62
                                          • Instruction ID: 6e45da03826c80611227b270e35f785d3c98e616ba52dff827f5e5e91a50daaa
                                          • Opcode Fuzzy Hash: 63cf341b71d1c7d208f98eba3b91d84992296a21f234aa84f18c080debebba62
                                          • Instruction Fuzzy Hash: 3251AF30B002069FDB54FB68D954A6AB7F2FF88340F14856DE4069B3A9DB35EC44CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000016.00000002.1994473714.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_22_2_6ae0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $kq$$kq$$kq$$kq
                                          • API String ID: 0-2881790790
                                          • Opcode ID: 0bbfad3e972b2444ca93408196f0786a49bf201260bd777e754e47d5c129d7c5
                                          • Instruction ID: c9a8a32c34c56724e4bedfc295ed5c2f8aa2e1ac35d5ac6e0638fa05a1b73854
                                          • Opcode Fuzzy Hash: 0bbfad3e972b2444ca93408196f0786a49bf201260bd777e754e47d5c129d7c5
                                          • Instruction Fuzzy Hash: 9F518F30E102098FDF64EB68D5906AEB7F2EF85311F14852AE506EB354DB34EC41CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:10.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:168
                                          Total number of Limit Nodes:11
                                          execution_graph 29221 3094668 29222 3094672 29221->29222 29226 3094758 29221->29226 29231 3093e28 29222->29231 29224 309468d 29227 309477d 29226->29227 29237 3094858 29227->29237 29241 3094868 29227->29241 29232 3093e33 29231->29232 29249 3097278 29232->29249 29233 3096fb2 29234 3095c54 LoadLibraryExW GetModuleHandleW 29233->29234 29235 3096fe2 29234->29235 29235->29224 29238 3094868 29237->29238 29239 309496c 29238->29239 29245 30944b0 29238->29245 29239->29239 29243 309488f 29241->29243 29242 309496c 29242->29242 29243->29242 29244 30944b0 CreateActCtxA 29243->29244 29244->29242 29246 30958f8 CreateActCtxA 29245->29246 29248 30959bb 29246->29248 29250 30972b1 29249->29250 29251 30972c8 29250->29251 29256 3097878 29250->29256 29260 3097340 29250->29260 29264 309732e 29250->29264 29268 309737a 29250->29268 29257 309795a 29256->29257 29258 3097994 29257->29258 29272 30996d2 29257->29272 29258->29251 29262 309739d 29260->29262 29261 3097994 29261->29251 29262->29261 29263 30996d2 2 API calls 29262->29263 29263->29261 29265 3097340 29264->29265 29266 3097994 29265->29266 29267 30996d2 2 API calls 29265->29267 29266->29251 29267->29266 29269 309738e 29268->29269 29269->29251 29270 3097994 29269->29270 29271 30996d2 2 API calls 29269->29271 29270->29251 29271->29270 29273 30996f0 29272->29273 29275 309974e 29272->29275 29273->29258 29274 30997c0 29274->29258 29275->29274 29278 3098a20 29275->29278 29277 309986d 29277->29258 29279 3098a2b 29278->29279 29282 3098a50 29279->29282 29281 3099942 29281->29277 29283 3098a5b 29282->29283 29286 3098a80 29283->29286 29285 3099a45 29285->29281 29287 3098a8b 29286->29287 29288 309abcb 29287->29288 29290 309d278 29287->29290 29288->29285 29294 309d29f 29290->29294 29298 309d2b0 29290->29298 29291 309d28e 29291->29288 29295 309d2b0 29294->29295 29301 309d397 29295->29301 29296 309d2bf 29296->29291 29300 309d397 2 API calls 29298->29300 29299 309d2bf 29299->29291 29300->29299 29302 309d3b9 29301->29302 29303 309d3dc 29301->29303 29302->29303 29307 309d630 LoadLibraryExW 29302->29307 29308 309d640 LoadLibraryExW 29302->29308 29303->29296 29304 309d3d4 29304->29303 29305 309d5e0 GetModuleHandleW 29304->29305 29306 309d60d 29305->29306 29306->29296 29307->29304 29308->29304 29309 309fa38 29310 309fa7e GetCurrentProcess 29309->29310 29312 309fac9 29310->29312 29313 309fad0 GetCurrentThread 29310->29313 29312->29313 29314 309fb0d GetCurrentProcess 29313->29314 29315 309fb06 29313->29315 29316 309fb43 29314->29316 29315->29314 29317 309fb6b GetCurrentThreadId 29316->29317 29318 309fb9c 29317->29318 29319 2ed0fd8 29320 2ed1023 ReadProcessMemory 29319->29320 29322 2ed1067 29320->29322 29101 309fc80 DuplicateHandle 29102 309fd16 29101->29102 29103 2ed4820 29104 2ed49ab 29103->29104 29105 2ed4846 29103->29105 29105->29104 29107 2ed1278 29105->29107 29108 2ed4aa0 PostMessageW 29107->29108 29109 2ed4b0c 29108->29109 29109->29105 29110 2ed1a62 29111 2ed1a6c 29110->29111 29112 2ed198c 29110->29112 29114 2ed1a20 29112->29114 29115 2ed36c8 29112->29115 29116 2ed36e2 29115->29116 29122 2ed36ea 29116->29122 29130 2ed3f85 29116->29130 29134 2ed3b2e 29116->29134 29139 2ed418c 29116->29139 29143 2ed3d2d 29116->29143 29147 2ed4153 29116->29147 29151 2ed39d1 29116->29151 29156 2ed4091 29116->29156 29160 2ed4137 29116->29160 29165 2ed3ddb 29116->29165 29170 2ed42bc 29116->29170 29174 2ed3ebc 29116->29174 29179 2ed3e26 29116->29179 29122->29112 29131 2ed3d53 29130->29131 29132 2ed3d74 29131->29132 29184 2ed0ee8 29131->29184 29135 2ed3b49 29134->29135 29136 2ed3a85 29134->29136 29135->29122 29136->29135 29188 2ed1570 29136->29188 29142 2ed0ee8 WriteProcessMemory 29139->29142 29140 2ed4404 29140->29122 29141 2ed3fe3 29141->29139 29141->29140 29142->29141 29144 2ed3d53 29143->29144 29146 2ed0ee8 WriteProcessMemory 29144->29146 29145 2ed3d74 29146->29145 29192 2ed0d48 29147->29192 29196 2ed0d50 29147->29196 29148 2ed416d 29152 2ed3a03 29151->29152 29153 2ed3b49 29152->29153 29155 2ed1570 CreateProcessA 29152->29155 29153->29122 29154 2ed3ba2 29154->29122 29155->29154 29157 2ed4096 29156->29157 29200 2ed46c8 29157->29200 29158 2ed3bc7 29158->29122 29161 2ed3df2 29160->29161 29162 2ed3e07 29160->29162 29205 2ed0868 29161->29205 29209 2ed0861 29161->29209 29162->29162 29166 2ed3de1 29165->29166 29168 2ed0868 ResumeThread 29166->29168 29169 2ed0861 ResumeThread 29166->29169 29167 2ed3e07 29168->29167 29169->29167 29171 2ed42df 29170->29171 29173 2ed0ee8 WriteProcessMemory 29171->29173 29172 2ed4461 29173->29172 29175 2ed3e47 29174->29175 29176 2ed3ec3 29174->29176 29213 2ed0e28 29175->29213 29217 2ed0e20 29175->29217 29180 2ed3e38 29179->29180 29182 2ed0e28 VirtualAllocEx 29180->29182 29183 2ed0e20 VirtualAllocEx 29180->29183 29181 2ed424d 29182->29181 29183->29181 29185 2ed0f30 WriteProcessMemory 29184->29185 29187 2ed0f87 29185->29187 29187->29132 29189 2ed15f9 CreateProcessA 29188->29189 29191 2ed17bb 29189->29191 29191->29191 29193 2ed0d95 Wow64SetThreadContext 29192->29193 29195 2ed0ddd 29193->29195 29195->29148 29197 2ed0d95 Wow64SetThreadContext 29196->29197 29199 2ed0ddd 29197->29199 29199->29148 29201 2ed46dd 29200->29201 29203 2ed0d48 Wow64SetThreadContext 29201->29203 29204 2ed0d50 Wow64SetThreadContext 29201->29204 29202 2ed46f3 29202->29158 29203->29202 29204->29202 29206 2ed08a8 ResumeThread 29205->29206 29208 2ed08d9 29206->29208 29208->29162 29210 2ed08a8 ResumeThread 29209->29210 29212 2ed08d9 29210->29212 29212->29162 29214 2ed0e68 VirtualAllocEx 29213->29214 29216 2ed0ea5 29214->29216 29216->29176 29218 2ed0e68 VirtualAllocEx 29217->29218 29220 2ed0ea5 29218->29220 29220->29176
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d0b761f3862524f9280dd95ec38d2231d4c8f18ee55134dfaf12988feb87cd14
                                          • Instruction ID: 5d1163d65e5d20b24ecaab51b57766273d349d9f611c4d7b803c6e9ea4f95155
                                          • Opcode Fuzzy Hash: d0b761f3862524f9280dd95ec38d2231d4c8f18ee55134dfaf12988feb87cd14
                                          • Instruction Fuzzy Hash: C18122B4E05619CFCB04CFA9D980AEEFBB1FB88300F00995AD406B72A5D7349912CF58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2ccc3e5c6820fac7c38f68368f356c2e3736f939e37b7e17f2c8de9bd76caea
                                          • Instruction ID: d64dc45c0909a03cfc044424c1dc48a0db1e0c19f700c9e7eec54d39050cc555
                                          • Opcode Fuzzy Hash: c2ccc3e5c6820fac7c38f68368f356c2e3736f939e37b7e17f2c8de9bd76caea
                                          • Instruction Fuzzy Hash: E08111B4E05619CFCB04CFA9D980AEEFBB1FB88300F10A55AD406B7265D7349902CF58
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 309fa28-309fac7 GetCurrentProcess 299 309fac9-309facf 294->299 300 309fad0-309fb04 GetCurrentThread 294->300 299->300 301 309fb0d-309fb41 GetCurrentProcess 300->301 302 309fb06-309fb0c 300->302 303 309fb4a-309fb65 call 309fc07 301->303 304 309fb43-309fb49 301->304 302->301 308 309fb6b-309fb9a GetCurrentThreadId 303->308 304->303 309 309fb9c-309fba2 308->309 310 309fba3-309fc05 308->310 309->310
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0309FAB6
                                          • GetCurrentThread.KERNEL32 ref: 0309FAF3
                                          • GetCurrentProcess.KERNEL32 ref: 0309FB30
                                          • GetCurrentThreadId.KERNEL32 ref: 0309FB89
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID: aH
                                          • API String ID: 2063062207-2191227055
                                          • Opcode ID: 57def838b34f901855901a0327b4c2f3fd8693d1c3e9d04ba07aa5ed4f90aff2
                                          • Instruction ID: e19227132e6f19924a0d2e183d0d2d2a72e48165a581df3586be998fd2edfda9
                                          • Opcode Fuzzy Hash: 57def838b34f901855901a0327b4c2f3fd8693d1c3e9d04ba07aa5ed4f90aff2
                                          • Instruction Fuzzy Hash: 795136B09012098FEB14DFA9D948BDEFBF1FF48314F24802AE419A7360DB759944CB65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 317 309fa38-309fac7 GetCurrentProcess 321 309fac9-309facf 317->321 322 309fad0-309fb04 GetCurrentThread 317->322 321->322 323 309fb0d-309fb41 GetCurrentProcess 322->323 324 309fb06-309fb0c 322->324 325 309fb4a-309fb65 call 309fc07 323->325 326 309fb43-309fb49 323->326 324->323 330 309fb6b-309fb9a GetCurrentThreadId 325->330 326->325 331 309fb9c-309fba2 330->331 332 309fba3-309fc05 330->332 331->332
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 0309FAB6
                                          • GetCurrentThread.KERNEL32 ref: 0309FAF3
                                          • GetCurrentProcess.KERNEL32 ref: 0309FB30
                                          • GetCurrentThreadId.KERNEL32 ref: 0309FB89
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID: aH
                                          • API String ID: 2063062207-2191227055
                                          • Opcode ID: 1bfa5875dea0fbfdf688cf05b06ec58bcc47a714469d69efe0d76dd65738596e
                                          • Instruction ID: d137dae9324382dceb2a1b004c0f3bd11f2aadc3382861083e12dfe6ecb7e33e
                                          • Opcode Fuzzy Hash: 1bfa5875dea0fbfdf688cf05b06ec58bcc47a714469d69efe0d76dd65738596e
                                          • Instruction Fuzzy Hash: 145146B09012098FDB14DFAAD548B9EFBF1FF48314F24802AE419A7360DB749984CF65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 339 2ed1570-2ed1605 341 2ed163e-2ed165e 339->341 342 2ed1607-2ed1611 339->342 347 2ed1697-2ed16c6 341->347 348 2ed1660-2ed166a 341->348 342->341 343 2ed1613-2ed1615 342->343 345 2ed1638-2ed163b 343->345 346 2ed1617-2ed1621 343->346 345->341 349 2ed1625-2ed1634 346->349 350 2ed1623 346->350 358 2ed16ff-2ed17b9 CreateProcessA 347->358 359 2ed16c8-2ed16d2 347->359 348->347 351 2ed166c-2ed166e 348->351 349->349 352 2ed1636 349->352 350->349 353 2ed1691-2ed1694 351->353 354 2ed1670-2ed167a 351->354 352->345 353->347 356 2ed167c 354->356 357 2ed167e-2ed168d 354->357 356->357 357->357 360 2ed168f 357->360 370 2ed17bb-2ed17c1 358->370 371 2ed17c2-2ed1848 358->371 359->358 361 2ed16d4-2ed16d6 359->361 360->353 363 2ed16f9-2ed16fc 361->363 364 2ed16d8-2ed16e2 361->364 363->358 365 2ed16e4 364->365 366 2ed16e6-2ed16f5 364->366 365->366 366->366 367 2ed16f7 366->367 367->363 370->371 381 2ed1858-2ed185c 371->381 382 2ed184a-2ed184e 371->382 383 2ed186c-2ed1870 381->383 384 2ed185e-2ed1862 381->384 382->381 385 2ed1850 382->385 387 2ed1880-2ed1884 383->387 388 2ed1872-2ed1876 383->388 384->383 386 2ed1864 384->386 385->381 386->383 390 2ed1896-2ed189d 387->390 391 2ed1886-2ed188c 387->391 388->387 389 2ed1878 388->389 389->387 392 2ed189f-2ed18ae 390->392 393 2ed18b4 390->393 391->390 392->393 394 2ed18b5 393->394 394->394
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02ED17A6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: aH$aH
                                          • API String ID: 963392458-615657674
                                          • Opcode ID: 62e07d8be8b27e1f5925b21c8e65b1052a7a6d881768db2787a11cb124232ce4
                                          • Instruction ID: 12c0f059d9338723869e9da0598f42e89552f2c7206e965380512d4cdf646f45
                                          • Opcode Fuzzy Hash: 62e07d8be8b27e1f5925b21c8e65b1052a7a6d881768db2787a11cb124232ce4
                                          • Instruction Fuzzy Hash: 9F916A75D40219CFEB20CFA8C9417EDBBB2FF48314F1491A9E818AB250DB749986CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 614 309d397-309d3b7 615 309d3b9-309d3c6 call 309c700 614->615 616 309d3e3-309d3e7 614->616 621 309d3c8 615->621 622 309d3dc 615->622 617 309d3e9-309d3f3 616->617 618 309d3fb-309d43c 616->618 617->618 625 309d449-309d457 618->625 626 309d43e-309d446 618->626 671 309d3ce call 309d630 621->671 672 309d3ce call 309d640 621->672 622->616 628 309d459-309d45e 625->628 629 309d47b-309d47d 625->629 626->625 627 309d3d4-309d3d6 627->622 630 309d518-309d5d8 627->630 632 309d469 628->632 633 309d460-309d467 call 309c70c 628->633 631 309d480-309d487 629->631 664 309d5da-309d5dd 630->664 665 309d5e0-309d60b GetModuleHandleW 630->665 636 309d489-309d491 631->636 637 309d494-309d49b 631->637 635 309d46b-309d479 632->635 633->635 635->631 636->637 639 309d4a8-309d4b1 call 309c71c 637->639 640 309d49d-309d4a5 637->640 645 309d4be-309d4c3 639->645 646 309d4b3-309d4bb 639->646 640->639 647 309d4e1-309d4e5 645->647 648 309d4c5-309d4cc 645->648 646->645 669 309d4e8 call 309d930 647->669 670 309d4e8 call 309d940 647->670 648->647 650 309d4ce-309d4de call 309c72c call 309c73c 648->650 650->647 653 309d4eb-309d4ee 655 309d511-309d517 653->655 656 309d4f0-309d50e 653->656 656->655 664->665 666 309d60d-309d613 665->666 667 309d614-309d628 665->667 666->667 669->653 670->653 671->627 672->627
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0309D5FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID: aH
                                          • API String ID: 4139908857-2191227055
                                          • Opcode ID: 0d7212d8dc5bc2ce565056639ffede53427bf6d7506aca5049dc1124d350c307
                                          • Instruction ID: b21ba1697335f2a34ed1231f38bdee76cdd615bb1a742943719c70bff962b6bc
                                          • Opcode Fuzzy Hash: 0d7212d8dc5bc2ce565056639ffede53427bf6d7506aca5049dc1124d350c307
                                          • Instruction Fuzzy Hash: BD814470A01B058FEB64DF29D44079ABBF5FF88204F04896ED48ADBB50D734E845CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 673 30958ec-30959b9 CreateActCtxA 675 30959bb-30959c1 673->675 676 30959c2-3095a1c 673->676 675->676 683 3095a2b-3095a2f 676->683 684 3095a1e-3095a21 676->684 685 3095a31-3095a3d 683->685 686 3095a40 683->686 684->683 685->686 687 3095a41 686->687 687->687
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 030959A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID: aH
                                          • API String ID: 2289755597-2191227055
                                          • Opcode ID: 49d5d3cde17c796c1738b447fee4bc0c27ac0ad8ad1a63718fff893044119c84
                                          • Instruction ID: d79bb7309772d5f67280118dc751bc1f73813b1deffd0da3a1de2b1f246895e3
                                          • Opcode Fuzzy Hash: 49d5d3cde17c796c1738b447fee4bc0c27ac0ad8ad1a63718fff893044119c84
                                          • Instruction Fuzzy Hash: 7A41D1B1D00619CEDF24CFAAC984BDEBBF5BF49304F24806AD408AB255DB755946CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 689 30944b0-30959b9 CreateActCtxA 692 30959bb-30959c1 689->692 693 30959c2-3095a1c 689->693 692->693 700 3095a2b-3095a2f 693->700 701 3095a1e-3095a21 693->701 702 3095a31-3095a3d 700->702 703 3095a40 700->703 701->700 702->703 704 3095a41 703->704 704->704
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 030959A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID: aH
                                          • API String ID: 2289755597-2191227055
                                          • Opcode ID: 6b63a3b1d5228afaa3f1d7910753b9767d4f23cdc255d482a3f46bdee04c1bcb
                                          • Instruction ID: 4bda398609fd49d7baa1ff4f7a38d99f48489272e491aabf08fe4683e6911b28
                                          • Opcode Fuzzy Hash: 6b63a3b1d5228afaa3f1d7910753b9767d4f23cdc255d482a3f46bdee04c1bcb
                                          • Instruction Fuzzy Hash: 4941BEB0C0471DCBDB24DFAAC984A9EBBF5BF49304F24806AD408AB255DB756946CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 706 2ed0ee8-2ed0f36 708 2ed0f38-2ed0f44 706->708 709 2ed0f46-2ed0f85 WriteProcessMemory 706->709 708->709 711 2ed0f8e-2ed0fbe 709->711 712 2ed0f87-2ed0f8d 709->712 712->711
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02ED0F78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID: aH
                                          • API String ID: 3559483778-2191227055
                                          • Opcode ID: fd901803eaac21efca2ff501549a0d702cd62cd2ca7fd88e9bb44151e65ac8bd
                                          • Instruction ID: d4494d74991e4ae5cdc0d88cb07392bbec2673a63214e854be0e06edfe28e9eb
                                          • Opcode Fuzzy Hash: fd901803eaac21efca2ff501549a0d702cd62cd2ca7fd88e9bb44151e65ac8bd
                                          • Instruction Fuzzy Hash: D12169B1900319DFCB10CFAAC981BDEBBF5FF48324F108429E958A7250C7789944CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 716 2ed0d48-2ed0d9b 718 2ed0d9d-2ed0da9 716->718 719 2ed0dab-2ed0ddb Wow64SetThreadContext 716->719 718->719 721 2ed0ddd-2ed0de3 719->721 722 2ed0de4-2ed0e14 719->722 721->722
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02ED0DCE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID: aH
                                          • API String ID: 983334009-2191227055
                                          • Opcode ID: 1cf680e2e6e034923e065343fa630e9fda9da80c1ebc18d1a01d1f1dd3278754
                                          • Instruction ID: 7a8e6597bad84b5e5a80eb6a207e1d0495cce894ee18311aad4c544a9b29aa1f
                                          • Opcode Fuzzy Hash: 1cf680e2e6e034923e065343fa630e9fda9da80c1ebc18d1a01d1f1dd3278754
                                          • Instruction Fuzzy Hash: 3B2159719003088FCB10DFADC5857EEBFF5AF88324F14842AD499A7241C7789946CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 726 309fc78-309fc7b 727 309fc80-309fd14 DuplicateHandle 726->727 728 309fd1d-309fd3a 727->728 729 309fd16-309fd1c 727->729 729->728
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0309FD07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID: aH
                                          • API String ID: 3793708945-2191227055
                                          • Opcode ID: c09d9f5c80b733cb2bbb81e5e90001a1c495d50a3fcbdce09935e50c42174caf
                                          • Instruction ID: 091b08d35e2862ddcc5052cc8c2b998eaf9e68bf3a9036e915972a441b1c0f6e
                                          • Opcode Fuzzy Hash: c09d9f5c80b733cb2bbb81e5e90001a1c495d50a3fcbdce09935e50c42174caf
                                          • Instruction Fuzzy Hash: A421E3B5901219AFDB10CFAAD984ADEFFF9FB48310F14841AE958A3310D374A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 732 2ed0fd1-2ed1065 ReadProcessMemory 736 2ed106e-2ed109e 732->736 737 2ed1067-2ed106d 732->737 737->736
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02ED1058
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID: aH
                                          • API String ID: 1726664587-2191227055
                                          • Opcode ID: a0f217758c6a9f3bc61e520bbb99bad63b8513e3176bea61371a086547a179d8
                                          • Instruction ID: 8d382991b92e02dd06f93514bf4ad7cbd82be546373842abc78e846bb703f09f
                                          • Opcode Fuzzy Hash: a0f217758c6a9f3bc61e520bbb99bad63b8513e3176bea61371a086547a179d8
                                          • Instruction Fuzzy Hash: 3A2159B1900359DFCB10DFA9C980BEEBBF5FF48310F10842AE559A7250C7389941CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 751 2ed0fd8-2ed1065 ReadProcessMemory 754 2ed106e-2ed109e 751->754 755 2ed1067-2ed106d 751->755 755->754
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02ED1058
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID: aH
                                          • API String ID: 1726664587-2191227055
                                          • Opcode ID: b0a02cedce406da8c850e992afa315d848957ef3d5cf753920f27b1c93878217
                                          • Instruction ID: b94b3c6624828f54cc221bfdb1788f508b6b4518035d9ebe7e1e021cb51f5bf7
                                          • Opcode Fuzzy Hash: b0a02cedce406da8c850e992afa315d848957ef3d5cf753920f27b1c93878217
                                          • Instruction Fuzzy Hash: B42125B1900359DFCB10DFAAC981BEEBBF5FF48320F50842AE558A7250C7789944CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 741 2ed0d50-2ed0d9b 743 2ed0d9d-2ed0da9 741->743 744 2ed0dab-2ed0ddb Wow64SetThreadContext 741->744 743->744 746 2ed0ddd-2ed0de3 744->746 747 2ed0de4-2ed0e14 744->747 746->747
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02ED0DCE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID: aH
                                          • API String ID: 983334009-2191227055
                                          • Opcode ID: 12dc34797d099e854b5b955834755afd23daa15c9b600ad677b5897d6ddf5133
                                          • Instruction ID: 88114f3c373fb0f41caee1bb4cc75614af8f076673a973c37fa7d646667eda95
                                          • Opcode Fuzzy Hash: 12dc34797d099e854b5b955834755afd23daa15c9b600ad677b5897d6ddf5133
                                          • Instruction Fuzzy Hash: 1C2147B19003098FDB10DFAAC5857EEBBF4EF88324F14C42AD459A7241CB78A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0309FD07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID: aH
                                          • API String ID: 3793708945-2191227055
                                          • Opcode ID: 14513847e9e7b01760f5f23666e2d689c55e0ca695d0db71aecf677f021358da
                                          • Instruction ID: ba5934f477f1aa88578a31c238da0713c1f445b437fa5ffcbe78f02e9658f096
                                          • Opcode Fuzzy Hash: 14513847e9e7b01760f5f23666e2d689c55e0ca695d0db71aecf677f021358da
                                          • Instruction Fuzzy Hash: C221E2B5901219DFDB10CFAAD984ADEFFF9EB48320F14841AE918A3310D374A940CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02ED0E96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: aH
                                          • API String ID: 4275171209-2191227055
                                          • Opcode ID: 27654589bd7216395603cda93d31659987f9e6de28aa070ff52245506e19dcdf
                                          • Instruction ID: 0693d47746b70bc7487c67587f4480bae23fbd353f3ac5f8e01c7b3ace8a6fb2
                                          • Opcode Fuzzy Hash: 27654589bd7216395603cda93d31659987f9e6de28aa070ff52245506e19dcdf
                                          • Instruction Fuzzy Hash: 291144729002488FCB10DFA9C945BEEBFF6EF88320F248819E459A7260C7359955CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0309D679,00000800,00000000,00000000), ref: 0309D88A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: aH
                                          • API String ID: 1029625771-2191227055
                                          • Opcode ID: 00cbe9eb921492aa1524e9a8b5036f8050c1c3118dbd9ebef8aaf94068c3b72d
                                          • Instruction ID: f586e90aea4eab167a9166499a74ac12c01bd88bdc5891e67ba04c96108edffa
                                          • Opcode Fuzzy Hash: 00cbe9eb921492aa1524e9a8b5036f8050c1c3118dbd9ebef8aaf94068c3b72d
                                          • Instruction Fuzzy Hash: 401123B6D003089FDB10CF9AC948BDEFBF4EB48320F14846AE519A7211C375A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02ED0E96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: aH
                                          • API String ID: 4275171209-2191227055
                                          • Opcode ID: c8e897afb43d8de13dd7cb112cd0dcedf6ff823d5295e33633a641d49aaa77df
                                          • Instruction ID: d95758e39144d063771a7285428394c9f5532a9dc71b0302a66d6a841453f3dc
                                          • Opcode Fuzzy Hash: c8e897afb43d8de13dd7cb112cd0dcedf6ff823d5295e33633a641d49aaa77df
                                          • Instruction Fuzzy Hash: B61156729002488FCB10DFAAC945BDFBFF5EB48320F148819E559A7260C735A540CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0309D679,00000800,00000000,00000000), ref: 0309D88A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: aH
                                          • API String ID: 1029625771-2191227055
                                          • Opcode ID: c94f7cf60c2ec7ef3e4ccb6a84a6b2274b3bf8e340bc74eb189d98a481d676d9
                                          • Instruction ID: 5eaa64bb9d8a88c0831dbbd16cf486957256d117aaf4b6c80174dc34ccf81f0a
                                          • Opcode Fuzzy Hash: c94f7cf60c2ec7ef3e4ccb6a84a6b2274b3bf8e340bc74eb189d98a481d676d9
                                          • Instruction Fuzzy Hash: EA1120B6D003088FDB10CF9AC944BDEFBF4AB48320F14842AD819B7621C379A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ResumeThread.KERNELBASE(?), ref: 02ED08CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID: aH
                                          • API String ID: 947044025-2191227055
                                          • Opcode ID: d0cd9577616ff484476e9d77de0342312fb2c94669efd1bd53a3db4db85b22f8
                                          • Instruction ID: 6be5dd5f10ae1490de5b8d81b3589a504d9cf26df1940ae3f4ebbc843ac877fa
                                          • Opcode Fuzzy Hash: d0cd9577616ff484476e9d77de0342312fb2c94669efd1bd53a3db4db85b22f8
                                          • Instruction Fuzzy Hash: 7C1158B1D003488FCB20DFAAC5857EEFBF5EB88324F248829C459A7250C779A945CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • ResumeThread.KERNELBASE(?), ref: 02ED08CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID: aH
                                          • API String ID: 947044025-2191227055
                                          • Opcode ID: 64812d31bf8c24f5a01109e0bfddfcfd0250e54ebcbc965971b2e230adf0f2ad
                                          • Instruction ID: 87f9cda19e704c92455f8d46d1bc9185532c560d579d60f7fa0d735f25e080f1
                                          • Opcode Fuzzy Hash: 64812d31bf8c24f5a01109e0bfddfcfd0250e54ebcbc965971b2e230adf0f2ad
                                          • Instruction Fuzzy Hash: 1E1136B1D003498FCB20DFAAC5457DEFBF8EB88324F248829D459A7250CB75A944CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0309D5FE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002799019.0000000003090000.00000040.00000800.00020000.00000000.sdmp, Offset: 03090000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_3090000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID: aH
                                          • API String ID: 4139908857-2191227055
                                          • Opcode ID: 9059e2be930bc7b413a829793600373ed715cb21aad4db648dcf23ecbba5a94a
                                          • Instruction ID: b01e6770c6bf9e5b245e5920d321683f51c6204dbed24de734883d34ee025048
                                          • Opcode Fuzzy Hash: 9059e2be930bc7b413a829793600373ed715cb21aad4db648dcf23ecbba5a94a
                                          • Instruction Fuzzy Hash: B311E0B6C003498FDB10DF9AC544ADEFBF4AB89324F14842AD459A7210D375A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 02ED4AFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2002489786.0000000002ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_2ed0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID: aH
                                          • API String ID: 410705778-2191227055
                                          • Opcode ID: 73adac6086ef62189c6331b816e8a1b9284634f96082a4e746c55647ba8ea83f
                                          • Instruction ID: 01ac528c9369a28672946a2ec355ca1cb280e7413ca018ecf2a498780487c795
                                          • Opcode Fuzzy Hash: 73adac6086ef62189c6331b816e8a1b9284634f96082a4e746c55647ba8ea83f
                                          • Instruction Fuzzy Hash: 511133B5900348DFCB20DF8AD985BDEBBF8EB58320F10841AE518A7240D375A940CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: 1572b5bfb75dc24b5789ce4ccd931043670bd8b134e77bc0553203c2980644c9
                                          • Instruction ID: edb0a3e172fb17e0b1f654ee19f47e743b1f1e4acf1d9a005645fe991773e0cb
                                          • Opcode Fuzzy Hash: 1572b5bfb75dc24b5789ce4ccd931043670bd8b134e77bc0553203c2980644c9
                                          • Instruction Fuzzy Hash: 5C910270A00314DFDB008F68D944BAEBBB5FB65706F04406AE503EBA92D7358C82CBD1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: ad746bed3f336d1f8f4603d718d45e949fb67bce7886ce49af2f0501e5cf57ef
                                          • Instruction ID: 2193302573fe65582a387fb7dd2baa3e2e6b9d1e9279a91c737489b838bb583d
                                          • Opcode Fuzzy Hash: ad746bed3f336d1f8f4603d718d45e949fb67bce7886ce49af2f0501e5cf57ef
                                          • Instruction Fuzzy Hash: 9941BF35B013158FCB01DFB998449AEBBF6FFC82617248529E416DB3A1EB30DD068790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: 3dbd2363c573cff1fd749112ee3296b7bb265d20fdd1a5bf0fa3381396737308
                                          • Instruction ID: e0c7ce8429f93a6a168d0f287ab7e2108d1daa4114f171427e317c3262538677
                                          • Opcode Fuzzy Hash: 3dbd2363c573cff1fd749112ee3296b7bb265d20fdd1a5bf0fa3381396737308
                                          • Instruction Fuzzy Hash: 3F410FB1C00349DFDB20DFA9C584A8EBBB5BF48304F24842AD409AB215D7B56A89CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: 533b6efc468be58819bb5ccc708672692cb6abc348872bec56d512f2b475da03
                                          • Instruction ID: 7ab96123a33dcef965ef7d7e3d787332df32e9728e3aa5e42d00b8c013a8df1e
                                          • Opcode Fuzzy Hash: 533b6efc468be58819bb5ccc708672692cb6abc348872bec56d512f2b475da03
                                          • Instruction Fuzzy Hash: BB41E2B1D00309DFDB20DFA9C584ADEBBB5BF48305F64842AD409BB215D7B56A49CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: efbb91059041a673314220e12c678ef5ce4db572de514e3a5b1e2b74661fa21f
                                          • Instruction ID: eb29243e9ab2ad6f44f346588357250f65eef9d4bc4d1d016d2eba12ee7a6662
                                          • Opcode Fuzzy Hash: efbb91059041a673314220e12c678ef5ce4db572de514e3a5b1e2b74661fa21f
                                          • Instruction Fuzzy Hash: 9C31F674E043588FDB04CFAAC954BEEBBB6BF89301F10812AD41AAB765DB745906CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: b8e49ec3cffbc2e6a3780b934dab87d0fa187de6cea8a6df95d34050bde9c653
                                          • Instruction ID: eb6505f18266ab84db546f80bf0a008335a0d690fbabeb2e7c3e1101b5ad0c5e
                                          • Opcode Fuzzy Hash: b8e49ec3cffbc2e6a3780b934dab87d0fa187de6cea8a6df95d34050bde9c653
                                          • Instruction Fuzzy Hash: 5C31C474E043188FDB04DFAAC9547AEBBB6BF89701F109129D81AAB754DB746906CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: a6db656b2487efa88754b6c0a182caeb82441f5952a21d14669a54f2ee536a57
                                          • Instruction ID: f570906ae9b274e5dc0a5f6f85018069d016da1b0a8eed7a504d5f0ffb9c733c
                                          • Opcode Fuzzy Hash: a6db656b2487efa88754b6c0a182caeb82441f5952a21d14669a54f2ee536a57
                                          • Instruction Fuzzy Hash: 2331D1B0C01358DFDB20DF99D588BDEBFB4AB48314F24805AE409BB651C7B95885CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: f2acf1de4ec6d621ba7564e71cf84a9403383f01bb5fbee9567342423a456fe7
                                          • Instruction ID: 95c3b3f15c04503a052825cf335b029f88d9850076aeb9b2bc4777218983e801
                                          • Opcode Fuzzy Hash: f2acf1de4ec6d621ba7564e71cf84a9403383f01bb5fbee9567342423a456fe7
                                          • Instruction Fuzzy Hash: 1F31E0B0C01318DFDB20DF99C588BCEBFF4AB08314F24845AE409BB650C7B95885CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: b8def17f040df53025026304fa65512deb13d211b73fbcf778049c6070d78c8c
                                          • Instruction ID: 5e066052a2b042f055cbe377306c0ad691a4716d77d259a1c8ed8045a7a73500
                                          • Opcode Fuzzy Hash: b8def17f040df53025026304fa65512deb13d211b73fbcf778049c6070d78c8c
                                          • Instruction Fuzzy Hash: AF115E71B0031A8BCB18EBB999006EFB7B6AF89211F104079D515E7354EB359E11CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: 78d28e5d6e946a0a7bcc1786d0c30c235b326a0ec580aeaeffcb49d868bd44a2
                                          • Instruction ID: d07ae734eaeae10a471ced6a93ed8cbdb745de4cf0069ec36290b887b24ad1dc
                                          • Opcode Fuzzy Hash: 78d28e5d6e946a0a7bcc1786d0c30c235b326a0ec580aeaeffcb49d868bd44a2
                                          • Instruction Fuzzy Hash: 3D2112B6900349DFCB10DF9AD984BDEBBF4FB48320F10842AE919A7210D374A954CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: aH
                                          • API String ID: 0-2191227055
                                          • Opcode ID: f3b1e82d7327f66cf373a4e2270dc14f6b3e8fe5c82e26ce002a0702831b699d
                                          • Instruction ID: 878c2f8c33cddd772f32507524c67d66ee3df00b3037179e797db058db2d4f41
                                          • Opcode Fuzzy Hash: f3b1e82d7327f66cf373a4e2270dc14f6b3e8fe5c82e26ce002a0702831b699d
                                          • Instruction Fuzzy Hash: DD11E0B59003488FCB20DF9AD584B9EBBF4EB48320F20841AE569A7610D778A944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tekq
                                          • API String ID: 0-2319236580
                                          • Opcode ID: 4e2c45d136963336e5cb17ae05165d13f58a5c947a857b9ad5626793687aed55
                                          • Instruction ID: d7ed4c7c36819ab38fc45a0fa657fc9e016591cb4c5c6a7bc11862d0fa36c8ce
                                          • Opcode Fuzzy Hash: 4e2c45d136963336e5cb17ae05165d13f58a5c947a857b9ad5626793687aed55
                                          • Instruction Fuzzy Hash: 75118075E00209CFCB04DFE8C8809ADFBB2FB88310F20812AD918AB355C6316956DF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 2bff64661f68eb92610a8876f600a8e81bcc37af843c82a8b4e68a53b9b1db6f
                                          • Instruction ID: de402619f0b513b3d5dc71eaa2fc4bfc2e36b9839a05d88345e150699297728a
                                          • Opcode Fuzzy Hash: 2bff64661f68eb92610a8876f600a8e81bcc37af843c82a8b4e68a53b9b1db6f
                                          • Instruction Fuzzy Hash: 42E0DFB5D4C384DBD701CB20C4A87E4BF7AEB5B602F08A098D84E4E687E7388003CB00
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7739f6ed2201001773354fe2a895bb56569d08d4141bcd244dfca36f10c53f72
                                          • Instruction ID: db5e972612c23847f591c8d1bdfe764933f719d61bcbae380c06039ed9d36cc9
                                          • Opcode Fuzzy Hash: 7739f6ed2201001773354fe2a895bb56569d08d4141bcd244dfca36f10c53f72
                                          • Instruction Fuzzy Hash: 0AA10774E0421ACFCB44DBA8C9406EDBBB6FF89301F10D629D81AAB755DB30A946CB54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4305e3a3a9f39b8cfc9a49b74ac24384ffc6684752e0f3042672844e57aeee4a
                                          • Instruction ID: 34424cc9cf077538b566e3e1cf0fa37538d7e1c378382596790eae019d3e2adb
                                          • Opcode Fuzzy Hash: 4305e3a3a9f39b8cfc9a49b74ac24384ffc6684752e0f3042672844e57aeee4a
                                          • Instruction Fuzzy Hash: 29415676E09348AFCB01DB75DD40BEE7FB5EF96201B1445ABE406EF612D6309A06C7A0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b292e5c2f6e8b3e510bb78ddff45cbf98b729a7102f58570a57ff060b9755f7
                                          • Instruction ID: aa0e74a29577557b739bb3090820f624a708dcf6562179a25f2b888a4d1b0771
                                          • Opcode Fuzzy Hash: 9b292e5c2f6e8b3e510bb78ddff45cbf98b729a7102f58570a57ff060b9755f7
                                          • Instruction Fuzzy Hash: 54415D75E0020ADFCB44CF95D841AEEFBB2FB88311F14952AE506B7364D7749A45CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c50b079b23bd037af71733a89d9920dda586e6a34a7c691e5d1f3b7f36432012
                                          • Instruction ID: 448bb088d6b0dd607898cc398946a1ae061e9ab73c4644adeba5ed95cedd478f
                                          • Opcode Fuzzy Hash: c50b079b23bd037af71733a89d9920dda586e6a34a7c691e5d1f3b7f36432012
                                          • Instruction Fuzzy Hash: 74415C74E0020ADFCB44CF96D8419EEFBB2FB89311F10952AE506A7364D7749A85CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2eb1c37fe2860c6205be3456a432d836883bbd33f840d014fd6c787dfe0c55f
                                          • Instruction ID: 8c877887ac46c567e3befe1a12ac7b656d4e75dac8cf609ec61375aba96d2e1a
                                          • Opcode Fuzzy Hash: c2eb1c37fe2860c6205be3456a432d836883bbd33f840d014fd6c787dfe0c55f
                                          • Instruction Fuzzy Hash: 31310774E05229DFCF04CFA8D984AEDBBB6FF49706F209559E416AB621D731A906CF00
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2001880214.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_165d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2a6b09206445854ff9f0de1cd4189fd077dfe5279254199d6950066d698987e1
                                          • Instruction ID: c00d647d871c5b36e4406f28451f7a0e7c5293efba1f4b584aeb5d97eb6d4b61
                                          • Opcode Fuzzy Hash: 2a6b09206445854ff9f0de1cd4189fd077dfe5279254199d6950066d698987e1
                                          • Instruction Fuzzy Hash: AA210071604200DFDB65DF58DDC0B2BBF66FB98315F208169ED094B396C336D856CAA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2001956078.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_166d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 82ca39537fe0c918161defa9eaafc41cbf19919544b6d165377695f57f6d720b
                                          • Instruction ID: b2053659ec1d9d975fe491a0d63dfcfc19f1c2727d61096ba76b225cc2b7277b
                                          • Opcode Fuzzy Hash: 82ca39537fe0c918161defa9eaafc41cbf19919544b6d165377695f57f6d720b
                                          • Instruction Fuzzy Hash: 10210471644200EFDB05DF98D9C0B26BBADFB84324F24C56DDA894B396C376D846CAA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2001956078.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_166d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 612c499ff0c3b2fcfc5b8495172702bbb6081d6fb537be17e6dfef6e6817be60
                                          • Instruction ID: 9f611dfdd4a897deeccf787878313c776c85289c2cf5ed943194479eb93893e5
                                          • Opcode Fuzzy Hash: 612c499ff0c3b2fcfc5b8495172702bbb6081d6fb537be17e6dfef6e6817be60
                                          • Instruction Fuzzy Hash: 7D212271604240DFCB15DF58D984B26BFA9EB88314F20C56DE88A4B396C33BD847CAA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2001880214.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_165d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 327094963b4df779ecc760577ec13a347fd88d9f94919d7c3dfac7ca9172f56f
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 5E11CA72504280CFDB12CF44D9C4B16BF62FB84324F24C2A9DD094B6A6C33AD45ACBA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2001956078.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_166d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 54633054939c70a19e77b29e36898298e4e1d0ba9ecc0fd66c305019e5a32999
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: AD11D075604240DFDB02CF54D9C4B15BF65FB84324F24C6AAD9494B356C33AD40ACB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2001956078.000000000166D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0166D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_166d000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 5b89551a8a3db1d218a4fc84090697ee0266ae43f4183a1725a49c9d517c9834
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: AA118E75604280DFDB16CF54D9C4B15BF61FB84314F24C6AAD8494B756C33AD44ACB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 440a4a08009072d379b078a6c7220423f2c30785244769fafe239864fb35c256
                                          • Instruction ID: ade81f09b016ca6278fab52cd3d220bad56bb40b325c3cb0010bd48c279e48ec
                                          • Opcode Fuzzy Hash: 440a4a08009072d379b078a6c7220423f2c30785244769fafe239864fb35c256
                                          • Instruction Fuzzy Hash: 3711E378A093588FCB40DFA8C454A9DBBB6FF4A705F109159D81AAF75ADB386C06CF01
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 32a1c19a02f03da42a7d22de45fbb7bdd03f613e928175ce0121210cab26b9aa
                                          • Instruction ID: 86d0404cc458d3c82b2588f44af1aa48e33b0a2a1a592606ef13001541503d47
                                          • Opcode Fuzzy Hash: 32a1c19a02f03da42a7d22de45fbb7bdd03f613e928175ce0121210cab26b9aa
                                          • Instruction Fuzzy Hash: B601A2326052186FCB01EF6ED8509EE7FEADFC5314704C0A6E545DB225D630D8058B98
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e72fddc4e34e3079b9102cf81b8a43517b9f37897de64b981a1764cdeb4981f
                                          • Instruction ID: 01914a2fb13d15030f2874cf2168300949d4888bb98e983646786ba599eab9f3
                                          • Opcode Fuzzy Hash: 2e72fddc4e34e3079b9102cf81b8a43517b9f37897de64b981a1764cdeb4981f
                                          • Instruction Fuzzy Hash: BFF096766012086FCB04DF5ADC40DAEBBFAEFD8750704C476E915DB314D631D9118B94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e7b6214bbadec211843443f2b2fa1cccee1e91410b108f28adc256ce7208e138
                                          • Instruction ID: e3f6bba098c179e32f029a5c38185a8c9c8ac1690d8101846eae9e005471a906
                                          • Opcode Fuzzy Hash: e7b6214bbadec211843443f2b2fa1cccee1e91410b108f28adc256ce7208e138
                                          • Instruction Fuzzy Hash: E6F06D34A45348CFCB04DFA9D94469CBBBAFB84701F209625D806EF769DB345D06CB40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fd8d3ca7bab64a139f7eb306560c668bb89e00c9dcce375d4daaaaa4f705441
                                          • Instruction ID: 346556cca700d441e87766eb7f06cc96b4cc58837e031e3ce094f70e4fd6d534
                                          • Opcode Fuzzy Hash: 2fd8d3ca7bab64a139f7eb306560c668bb89e00c9dcce375d4daaaaa4f705441
                                          • Instruction Fuzzy Hash: CCF05E30A493488FCB44DF98C944A9CBBB5FF55341F105665D81AEF79AC7355906CF40
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6427defb2355e221a38a92c2a09fe3c54f3f6b300e7b62a58f7fd847546bbb9f
                                          • Instruction ID: 8c3dfc55dc9dd73a0f6a710676e5731750e03498b72c856e6b8743568a653649
                                          • Opcode Fuzzy Hash: 6427defb2355e221a38a92c2a09fe3c54f3f6b300e7b62a58f7fd847546bbb9f
                                          • Instruction Fuzzy Hash: C3E0EC2509E7D05DD2036B3C89645997F60DE53618B1948D7D1C58A067C454849DC39F
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dbe54859ac5bf1dc0528a6e0df00dba7985c7d8fbdb4752cbd73950fcf9df00d
                                          • Instruction ID: cb1a19cabbe0c67015734257c84ad834a5899e315acc8f7834f7607788739f17
                                          • Opcode Fuzzy Hash: dbe54859ac5bf1dc0528a6e0df00dba7985c7d8fbdb4752cbd73950fcf9df00d
                                          • Instruction Fuzzy Hash: C8D0123600E3446FD703A7609D80C72BF75FB5221835542A3F080C6032C2178D28DB72
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5f6de38256d2744718dc37b18408a41a09ec7da2b46aec8618ee26218072bfb
                                          • Instruction ID: c35948eed25e8facd4b512272600e7aaf524352029b4f5896bf1be089c69cca2
                                          • Opcode Fuzzy Hash: f5f6de38256d2744718dc37b18408a41a09ec7da2b46aec8618ee26218072bfb
                                          • Instruction Fuzzy Hash: 1BD01730808259CBC714DB99DC046BDB339EB9A332F809695802FA2A958B304841CB60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45bcc925230a60fe4ad9a351a58a5a46839244a97eb358bdfe1b350d731e8f4d
                                          • Instruction ID: efe7414cff60a3ff9bd646a0d36bb14187fac2ef1dadc1f67f664a3c84ef217f
                                          • Opcode Fuzzy Hash: 45bcc925230a60fe4ad9a351a58a5a46839244a97eb358bdfe1b350d731e8f4d
                                          • Instruction Fuzzy Hash: E5C08C300417088FC6003BD8B81C3247768E710306F405818A00944C528F745042C761
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000019.00000002.2027537236.0000000008AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_25_2_8ad0000_BjTxJte.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d38ec2191d6291e19504f1e26bc5d07ada4c7079976c4454f1416c29183b0b14
                                          • Instruction ID: 0fefc41293736d0e979c5ee9c2ea0c2e8bd7b38e48bba3bda49e302cacd7eb16
                                          • Opcode Fuzzy Hash: d38ec2191d6291e19504f1e26bc5d07ada4c7079976c4454f1416c29183b0b14
                                          • Instruction Fuzzy Hash: 61B012791DA305B1C40027644AC0B2AE630EBB9B02F909C22F307D0414C8319476D11F
                                          Uniqueness

                                          Uniqueness Score: -1.00%